Beruflich Dokumente
Kultur Dokumente
Field of Study
Auditing. Some state boards may count credits under different categories—check with your state
board for more information.
Course Level
Basic.
Prerequisites
There are no prerequisites.
Advanced Preparation
None.
Course Description
Auditors, more than any other group, are charged with detecting and preventing fraud within
businesses and nonprofits. The first part of the course provides an overview of fraud, profiles
perpetrators of fraud, and sheds light on what motivates people to commit fraud and how they
rationalize it. The latter half discusses fraud from an auditing point of view, risk factors for
fraud, how an auditor can detect fraud, how to investigate fraud, and how to implement SAS No.
99 to improve audit performance and increase the likelihood of detecting fraud. Useful,
illustrative examples are provided throughout.
Publication/Revision Date
This course was last updated September 2009.
i
Instructional Design
Instructional Design
Western CPE Self-Study courses are organized so as to lead you through a learning process
using instructional methods that will help you achieve the stated learning objectives. You will be
informed of the knowledge, skills, or abilities you will learn within each chapter of the course
(clearly defined learning objectives); you will learn the material (course content and instructional
methods); your learning will be reinforced (review questions); and your completion of meeting
the learning objectives will be measured (final exam questions). These and additional
instructional elements are listed and explained below. Please review this information completely
to familiarize yourself with all instructional features and to help ensure you will achieve all
course learning objectives.
Table of Contents
The table of contents allows you to quickly navigate to specific sections of the course.
Review Questions
The review questions accompanying each chapter are designed to assist you in achieving the
learning objectives stated at the beginning of each chapter. The review section is not graded; do
not submit it in place of your final exam. While completing the review questions, it may be
helpful to study any unfamiliar terms in the glossary in addition to chapter course content. After
completing the review questions for each chapter, proceed to the review question answers and
rationales.
Glossary
The glossary defines key terms. Please review the definition of any words of which you are not
familiar.
ii
Instructional Design
Index
The index allows you to quickly locate key terms or concepts as you progress through the
instructional material.
Final Exam
Final exams measure (1) the extent to which the learning objectives have been met and (2) that
you have gained the knowledge, skills, or abilities clearly defined by the learning objectives for
each section of the course. Unless otherwise noted, you are required to earn a minimum score of
70% to pass a course. You are allowed up to three attempts to pass the final exam. If you do not
pass on your first attempt, please review the learning objectives, instructional materials, and
review questions and answers before attempting to retake the final exam to ensure all learning
objectives have been successfully completed.
Evaluation
Upon successful completion of your online exam, we ask that you complete an online course
evaluation. Your feedback is a vital component in our future course development. Thank you.
Notice: This publication is designed to provide accurate information in regard to the subject matter covered. It is
sold with the understanding that neither the author, the publisher, nor any other individual involved in its distribution
is engaged in rendering legal, accounting, or other professional advice and assumes no liability in connection with
its use. Because regulations, laws, and other professional guidance are constantly changing, a professional should be
consulted should you require legal or other expert advice. Information is current at the time of printing.
iii
Table of Contents
Table of Contents
iv
Table of Contents
v
Table of Contents
vi
Table of Contents
vii
Table of Contents
viii
Table of Contents
ix
Table of Contents
x
Table of Contents
xi
Chapter 1: Introduction to Fraud
It is rare for a week to go by without the national or local press reporting another fraud. These
frauds range from an employee defrauding a local company out of a small sum of money to a
multimillion-dollar fraud that captures the attention of the nation.
Auditors are in a unique situation with respect to fraud. The public looks to them, more than any
other group, to prevent and detect fraud. And you can be sure that when it occurs in a company
with audited financial statements, the auditor will probably be sued by somebody. Therefore, it
behooves auditors to understand fraud.
The economic losses to fraudulent activity each year are staggering. The Association of
Certified Fraud Examiners estimates that fraud costs the United States $660 billion dollars a
year. That compares to its estimate of $11 billion dollars lost to violent crime each year.
The financial literature is full of stories of people who have committed a fraud or companies
victimized by fraud. The financial press also frequently publishes estimates of the losses
incurred as a result of fraud.
1
Chapter 1: Introduction to Fraud
Fraud is not a problem that is confined to the United States. In the United Kingdom, more than
300 cases of fraud involving amounts in excess of $150,000 were reported in a recent five-year
period. A survey in Ireland shows that during a three-year period, over 40 percent of the largest
500 corporations experienced a fraud. In recent years, Canada has reported losses of $39 million
from fraud. The biggest losses were a result of false financial statements, kickbacks, and
phantom vendors.
Not only are the losses to fraud very high, but the estimates of the number of people who commit
or would commit a dishonest act are also very high. Consider the following estimates:
Χ The director of fraud and security for a large consulting company stated that of every 10
workers, three look for a way to steal, three would steal if given an opportunity, and four
would usually be honest.
Χ Two out of every three college students admit to cheating on exams.
Χ An Institute of Management study found that 87 percent of managers were willing to
commit fraud if it would make their organizations look better.
Χ A study of 400 people found that 47 percent of top executives, 41 percent of controllers,
and 76 percent of graduate-level business students were willing to commit fraud by
understating write-offs that cut into their company’s profits.
One of the reasons why the losses to fraud are so much greater than those for violent crimes is
that fraud “pays better” than other crimes. One study found that the average loss to robbery was
$250 and to burglary was $450. In contrast, the average fraud committed by a company
employee was $23,500, and the average loss in a computer fraud was $500,000.
It is important to remember that the estimates of fraud losses are only that: estimates. The fact is
that no one really knows how much money is lost to fraud each year. Many frauds are not
detected and many of those that are detected are not reported to authorities. What we do know,
however, is that the losses are very large and that they are growing.
Definition of Fraud
Just what is this fraud that costs society so much, and exactly what does it consist of? It is
usually more difficult for auditors to discover frauds than it is to uncover errors because of the
intended deception associated with a fraud.
Fraud is defined as an intentional act of deceit for the purpose of gaining an unfair advantage that
results in an injury to the rights or interests of another person. This can be done using things
such as presentation of false or misleading information, suppressions of the truth, lies, tricks, and
cunning. Fraud perpetrators are often referred to as white-collar criminals to distinguish them
from criminals who commit violent crimes.
To commit most frauds, a perpetrator must take three different steps: the theft itself; converting
the asset to personal use; and concealing the fraud.
First, the fraudster must take something of value, such as cash, inventory, tools, supplies,
equipment, or data. It can also be an intentional reporting of misleading financial information.
2
Chapter 1: Introduction to Fraud
Second, the perpetrator converts the assets into a form that can be used personally. This
conversion is usually required for all stolen assets except cash. Stolen checks must be deposited
to an account from which the perpetrator can withdraw funds. Information (such as trade secrets
or confidential company data) is often sold to someone such as a competitor.
Industry experts estimate that computer companies annually lose up to $200 billion in computer
chips due to armed robbery and employee theft. In some circles, computer chips are better than
gold. Their theft is being referred to as the crime of the electronic age. Employees who steal
these chips must convert them to cash. A sophisticated black market exists for the chips, and
they often change hands as much as ten times in three days. When some companies run short of
chips, they often end up buying their stolen chips back.
Example: On the advice of its trusted manager, a brand-name carpet manufacturer approved
purchase orders replacing looms described by a subsidiary as deteriorated past
reconditioning. But instead of being discarded or sold to a dealer, the used looms,
which were in perfectly sound condition, found their way to another building in a
town close by, along with skilled workers to man them. In a short time, a new low-
priced carpet maker was bidding against the original brand.
Third, the perpetrator must conceal the crime in order to avoid detection and to continue the
fraud. Concealing a fraud often takes more time and effort and leaves behind more evidence
than the actual theft does. Where there are checks and balances in the system, the perpetrator
often must “cook the books” to avoid detection.
The theft of cash may require the employee to doctor the bank reconciliation or to make false
accounting entries to avoid detection. Taking cash takes only a few seconds, but altering records
to hide the theft can be more challenging and time-consuming. One effective way to hide an
employee theft is to charge the stolen item off to an expense account.
An employee could steal $10,000 and charge it off to miscellaneous expense. Or, a payroll clerk
could add a fictitious name to the employee payroll records, intercept the paycheck, and cash it.
The company would be missing funds, but the books would be in balance because there was a
debit to a wages expense and a credit to cash.
In the case of expense accounts, the perpetrator’s principal exposure is limited to a year or less,
because expense accounts are zeroed out at the end of the year.
If perpetrators chose to hide the theft by affecting another balance-sheet account, they would
have to continue to hide it. Hence, one of the most popular ways to cover up a fraud is to hide the
theft in an income-statement account.
One of the most effective ways to prevent the theft-conversion-concealment process is to have an
effective system of internal controls. When such a system of controls is in effect, fraud is made
much more difficult. The internal control system must either be overridden or two or more
3
Chapter 1: Introduction to Fraud
Example: For example, at one auto repair shop, the accountant, a lifelong friend of the shop’s
owner, embezzled ever-increasing funds from the shop over a seven-year period. In
4
Chapter 1: Introduction to Fraud
the last year of the fraud, when the embezzler took over $100,000, the owner, facing
bankruptcy, eventually had to fire the accountant and have his wife take over the
bookkeeping. When the company began doing better, the wife began looking into the
reasons for the recovery. She uncovered the fraud.
8. The most significant contributing factor in most frauds is the failure to enforce existing
internal controls.
Types of Fraud
This course discusses four types of fraud:
1. A theft of assets, which many people refer to as employee fraud or a defalcation. SAS
No. 99, Consideration of Fraud in a Financial Statement Audit, refers to this as a
misappropriation of assets.
2. Management fraud, which SAS No. 99 refers to as fraudulent financial reporting.
3. External fraud.
4. Investment fraud.
The Association of Certified Fraud Examiners (ACFE) sent out 8,000 questionnaires to its
members asking them to report on frauds they were aware of. They had 2,563 usable responses
to their questionnaires. The study did not specifically delve into fraudulent financial reporting or
investment fraud, but it did look into employee and external frauds such as customer and vendor
frauds. The study shows that 61.8 percent were employee frauds; 6.2 percent were vendor
frauds; 11.4 percent were customer frauds; and 11.6 percent involved collusion between
employee and an outsider. (Other studies have shown that up to one-third of all fraud involves
collusion.)
It is very difficult to prevent or detect collusion involving two or more employees or collusion
between a customer or vendor and a company employee. The preventive aspect of the internal
control system can often be negated or circumvented by collusion. In addition, when two or
more people work together, it is much easier for perpetrators to hide their tracks.
Example: Two women at a credit-card company colluded to steal funds. One woman was
authorized to set up credit-card accounts, the other to write off unpaid accounts of
less than $1,000. The woman who created the accounts simply created a new account
for each of them using fictitious data. When the amount outstanding neared the
$1,000 limit, the woman in collections wrote them off. The first woman would then
create two new cards, and the process would be repeated. The women were caught
when one of them kicked her live-in boyfriend out of the house and would not let him
back in. To get even, he called the credit-card company and told the company what
the women were doing.
The most frequent forms of employee/vendor collusion include billing at inflated prices;
performing substandard work and receiving full payment; payment for nonperformance;
duplicate billings; and improperly funneling more work or purchasing more goods from a
colluding company.
5
Chapter 1: Introduction to Fraud
Collusion may cause the auditor to believe that evidence is persuasive when it is, in fact, false.
For example, through collusion, false evidence that control activities have been performed
effectively may be presented to the auditor, or, the auditor may receive a false confirmation from
a third party who is colluding with management.
Employee Fraud
SAS No. 99, Consideration of Fraud in a Financial Statement Audit, defines misappropriation of
assets as “... the theft of an entity’s assets. Misappropriation can be accomplished in various
ways, including embezzling receipts, stealing assets, or causing an entity to pay for goods or
services not received. Misappropriation of assets may be accompanied by false or misleading
records or documents and may involve one or more individuals among management, employees,
or third parties.”
One study of 270 employee frauds found that 261 of the frauds involved the theft of cash. Cash
is far and away the most likely asset to be stolen because it can easily be spent; it does not need
to be converted into a spendable form, as do inventory and fixed assets; and it is usually easier to
take a larger amount of cash than any other type of asset.
Example: Albert Miano, a middle manager at Reader’s Digest making $35,000 per year,
embezzled $1 million from 1982 to 1987. Miano was responsible for processing bills
from the painters and carpenters at Reader’s Digest headquarters. As a test of the
system, he forged the signature of a superior on an invoice for painting that was never
done, submitted it to accounts payable, and told them to give him the check because
the painter needed it in a hurry. When the check went through, Miano forged the
painter’s endorsement on the check and deposited it in his own account. The scheme
was so easy he continued it for five years, buying a $416,000 contemporary house in
Connecticut, five cars, and an $18,000 motor boat.
6
Chapter 1: Introduction to Fraud
There are many other types of employee fraud, including theft of inventory or other assets, the
unauthorized sale of assets, collusion with customers or suppliers, kickbacks and bribes, use of
company resources for personal purposes, and false reports or entries into accounts to improve
performance or cover missing assets.
Example: A Continental Illinois Bank vice president that was charged with approving $1 billion
in bad loans in exchange for $585,000 in kickbacks. The loans cost the Chicago bank
$800 million and helped trigger its collapse.
The National Commission on Fraudulent Financial Reporting (also known as the Treadway
Commission) defines fraudulent financial reporting similarly: “... intentional or reckless conduct,
whether by act or omission, that results in materially misleading financial statements.”
Fraudulent financial reporting is a very serious issue, one that is of great concern to independent
auditors. This was born out by the Treadway Commission’s study of over 450 lawsuits against
auditors between the years 1960 and 1985. They found fraud to be a factor in approximately 50
percent of them. When the Treadway Commission issued its recommendations, it suggested
several things that could be done to reduce the possibility of fraudulent financial reporting.
1. Establish an organizational environment and tone that contributes to the integrity of the
7
Chapter 1: Introduction to Fraud
financial-reporting process.
2. Identify and understand the factors that can lead to fraudulent financial reporting.
3. Assess the risk of fraudulent financial reporting that these factors can cause within the
company.
4. Design and implement internal controls that provide reasonable assurance that fraudulent
financial reporting will be prevented.
Fraudulent financial reporting and misappropriation of assets are different in several ways:
a. Misappropriation of assets is committed against an entity, most often by employees,
while fraudulent financial reporting is usually committed by management to deceive
financial-statement users.
b. Misappropriation of assets involves the theft of assets, while most fraudulent financial
reporting involves the overstatement of assets or revenues.
c. Few employees or companies are motivated to steal or overstate liabilities or equities.
d. However, companies are motivated to understate liabilities as a means to fraudulently
misstate financial statements.
Both types of fraud can but do not necessarily result in material misstatements of an entity’s
financial statements.
External Fraud
Most organizations have safeguards over corporate assets that make it relatively more difficult
for an outsider to steal company assets. More often, the theft or misstatement comes from an
insider who has a knowledge and understanding of the company’s policies and procedures for
safeguarding assets. With that knowledge, the person is able to violate a trust, evade control
procedures, and commit and conceal the crime.
The following estimates reflect the frequency of fraud committed by insiders versus fraud
committed by outsiders. Retail stores estimate that 70 percent of their losses are a result of
employee theft; only 30 percent result from shoplifting. Banking organizations estimate that
over 90 percent of their fraud losses come from employee frauds. Less than 10 percent come
from external parties such as bank robbers and customers or suppliers.
However, even though external fraud is more difficult to commit, there is still a great deal of it,
and companies must take steps to protect against it.
External fraud is often categorized by the relationship of the perpetrator to the organization.
Fraud perpetrated by someone who buys from a company is referred to as customer fraud. Fraud
perpetrated by someone who sells goods to a company is referred to as vendor fraud.
In customer fraud, the perpetrator is able to get something of value without having to pay for it.
There are many ways to do this.
In a bust-out, the perpetrator may purchase goods but not pay for them. A bust-out is a
premeditated bankruptcy or insolvency, in which the perpetrator sets up a business; places small
orders for goods with as many suppliers as possible; sells the goods to retailers or other buyers at
8
Chapter 1: Introduction to Fraud
deep discounts (often 25 percent or more); and uses the cash to promptly pay for the goods to
build up a good credit record. Good credit histories with large established companies help lure
in smaller suppliers. After the perpetrator wins the confidence of suppliers, he or she places
huge orders with all suppliers as often as possible and then sells all the goods at discounted
prices. When the suppliers finally get wise and cut the perpetrator off, he or she declares
bankruptcy or moves to a new city to start the process all over again. In the last few years, the
number of bust-outs has increased 30 to 50 percent.
Example: Over a 15-year period, a con artist named Al Forman was involved in 25 separate
bust-outs, each of which netted him $1 million to $4 million dollars.
In a bleed-out, a company that has been in business for years goes out of business slowly by
refusing to pay creditors, one by one, until finally no one will extend it any more credit. It is
hard to prove that this is not just a business that has fallen on hard times.
The perpetrator may trick a company into sending goods or providing services and then not send
a bill, or send it to someone else. For example, perpetrators may break into a phone system or
steal a calling-card number and make phone calls that they are either not charged for or that are
billed to someone else. Or the perpetrators may try to use fake credit cards.
Example: One perpetrator found a way to break into a mail-order company’s computer system
and have the system send him merchandise but not a bill.
Example: A technology enthusiast named John Draper discovered that the whistle offered as a
prize in Cap’n Crunch cereal exactly duplicated the frequency of a WATS line. He
used his discovery to defraud phone companies by making a large number of free
telephone calls.
Bank customers can write NSF (not sufficient funds) checks, counterfeiters can create bogus
checks, or people can use stolen credit cards. The number of check-fraud cases has increased
from 537,000 to 1,267,000 over a recent two-year period and now costs commercial banks
almost $1 billion per year. Much of the increase is due to an organized effort by counterfeiters.
Example: A band of counterfeiters moved from town to town in the Northwest several years
ago. They illegally obtained a copy of a payroll check from a large employer in the
9
Chapter 1: Introduction to Fraud
town. Then they used a desktop publishing package and a laser printer to make bogus
checks. They capitalized on the fact that banks are normally required to cash
corporate checks immediately. On the day workers were paid, they flooded the town
with the checks and then moved on. The larger the bank, the more likely it is to
become a victim of organized counterfeiters. Almost 80 percent of the banks with
more than $5 billion in assets (as compared to only 48 percent of smaller banks) said
that professional con artists were responsible for most of their bad-check losses.
Companies or governmental entities are defrauded when their customers submit false or inflated
claims for insurance, disability, public assistance, Social Security, accidents, fires, theft, or
natural disasters. They even fake auto accidents and deaths.
Perpetrators can obtain bogus loans or fraudulent grants by filing false financial statements,
appraisals, credit ratings, or employee information, or pledging nonexistent capital.
In vendor fraud, the perpetrator gets a company or individual to fraudulently pay for goods or
services. Some examples of vendor fraud include inflating prices; substituting goods of inferior
quality; short-shipping; billing for services not performed; billing for goods not delivered; and
multiple billings for the same service.
The vendor may commit the fraud without help from an insider or by colluding with a company
employee. For example, a purchasing agent authorizes the purchase of goods at significantly
inflated prices and then receives a kickback of 25 percent of the overcharged amount.
Example: A kickback scheme at Avondale Shipyards resulted in the company’s paying $47
each for welding-gun tips that should have cost only $20 each.
Investment Fraud
In an investment fraud, the perpetrator sells an investor a worthless or overpriced investment or
promises an unusually high rate of return that cannot be honestly earned. Many of these frauds
are Ponzi schemes.
Many people regard Charles Bianchi, who used the alias of Charles Ponzi, as the king of
investment swindles. In 1920, Ponzi told investors he could purchase postal reply coupons in
Europe for one cent each and exchange them in the United States for 10 cents worth of postage
stamps. These stamps could then be converted into cash. However, he did not have the financial
resources to buy all of the postal reply coupons he could find, so he was willing to let others
invest with him. He promised to pay the investors a 50-percent return on their money every 45
days. However, Ponzi never invested more than a few dollars in the coupons. Instead, he took
the money of later investors and used it to pay off earlier investors. As he paid off his first
investors, word got around and hundreds of investors flocked to him seeking the high returns he
promised. In eight months, Ponzi cheated his investors out of $15 million. Ponzi’s only expense
was the 50 percent he promised to pay his investors. He spent the rest.
10
Chapter 1: Introduction to Fraud
investigated Ponzi and found that Europe had less than $1 million in postal reply coupons. Ponzi
was given federal and state jail sentences and was later deported. He died a pauper in Brazil.
Ponzi has had many imitators, and this type of fraud is known as a Ponzi scheme.
Summary
When 87 percent of managers surveyed indicate that they are willing to commit fraud if it would
make their organizations look better, we realize that fraud is a very serious problem. And,
unfortunately, societal trends lead us to believe that the problem will not get better any time
soon.
11
Chapter 1: Introduction to Fraud
Charles Ponzi was such a famous swindler that the investment fraud technique he used was
named after him, though he was not the first to use the scheme.
Carlo Bianchi was born in Italy in 1882. He was a postal worker and attended the University of
Rome. In 1903, he dropped out to immigrate to the United States under the name Charles Ponzi.
He arrived in Boston with $2.50 in his pocket, having gambled away the rest of his savings
during the voyage.
Ponzi worked odd jobs until he lost his waiter job for shortchanging customers. He moved to
Canada and worked for a bank that paid double the going interest rate by dipping into new
accounts. The bank failed and the owner fled to Mexico. Destitute, he forged a $423.58 check
and was sentenced to 3 years in prison. To hide his conviction from his mother, he wrote that he
had found a job as a "special assistant" to a prison warden.
Released after less than 2 years, he was caught smuggling Italians into the U.S. and spent two
years in an Atlanta prison. When he was released, he returned to Boston, married in 1918, and
started a company that failed.
Before his company failed, Ponzi received an international postal reply coupon (a form of pre-
paid postage) in the mail. A coupon, purchased abroad, could be exchanged in the U.S. for
postage to send a letter back abroad. Before World War I, prices were fixed so that the cost of a
coupon was the same in every country. When the war ended, many European currencies fell in
value while the coupon exchange rate remained the same. Ponzi learned that a coupon purchased
in for 1 cent in Europe could be redeemed for six 1-cent stamps in the U.S.
Ponzi started the Securities Exchange Company in December 1919 and set out to profit from this
price differential. His plan was to:
1. Convert American money into a currency where the exchange rate was favorable
2. Use the funds to purchase postal reply coupons in countries with weak economies
3. Exchange the coupons back into a favorable foreign currency
4. Convert the funds back into American dollars
Ponzi claimed 400% profits, after expenses and exchange rate fees. To help fund his purchases,
he promised investors a 50% return on their money in ninety days, but claimed he could deliver
in just forty-five days. In other words, you could double your money in just 90 days.
12
Chapter 1: Introduction to Fraud
Ponzi hired people to market his investment and paid generous commissions. However, his best
marketing was paying early investors double their money in 45 days. By February 1920, Ponzi
had taken in $5,000. By July 1920, he had taken in millions. At its peak, he had people lined up
for blocks trying to give him money and was taking in over $1,000,000 a week. People were
investing their life savings and widows were mortgaging their homes. So much money came in
it filled every desk drawer, wastepaper basket, and closet. To support his scheme, Ponzi
obtained a controlling interest in the Hanover Trust Bank.
Ponzi never invested the money he received in postal reply coupons. Instead, he used the money
of later investors to pay off earlier investors. This was easy to do because of the tremendous
growth in new money and the roll over of many of the old notes.
Ponzi splurged on a lavish lifestyle. He bought a 20-room mansion with air conditioning and a
heated swimming pool. He bought the finest jewels and dresses for his wife and the finest suits
for himself. His fellow Italians considered him a hero and cheered him wherever he went.
Early on, Ponzi was investigated by federal, state, and local authorities but no one could prove
wrongdoing. Ponzi paid his notes on time and no one filed a complaint against him.
When a furniture dealer sued him unsuccessfully, people who wondered how he could go from
broke to multi-millionaire so fast triggered a run on his company. His prompt payments quelled
the unrest and demands for repayment.
On July 24, 1920, the Boston Post ran a positive article that led to a surge in investments. That
same week he met with Massachusetts investigators and promised to stop taking in money while
they investigated him.
On July 26, the Post began a series of articles questioning Ponzi and his company. One article
quoted Clarence Barron, a financial analyst and the publisher of Barrons (a financial newspaper).
Barron stated that Ponzi would have to have purchased 160 million postal reply coupons based
on the money he had taken in, but there were only some 27,000 in circulation. Barron also stated
that the administrative costs necessary to handle the currency exchanges and the transaction costs
of purchasing, transporting, and redeeming such a large number of coupons would quickly eat up
the profits. The U.S. Post Office confirmed that large quantities of postal reply coupons were
not being purchased, either in the U.S. or abroad.
The articles caused investors to panic. Large and unruly crowds gathered at the Securities
Exchange Company. Ponzi calmed the crowd and gave out free coffee and donuts. Many were
so reassured they changed their minds about withdrawing their money. Even so, in three days
Ponzi repaid over $2 million in loans to over a thousand people.
Ponzi hired James McMasters as his publicity agent. Ponzi’s contradictory statements and the
13
Chapter 1: Introduction to Fraud
ongoing investigations made him so suspicious he quit. He sold his story to the Boston Post,
who quoted him as saying that Ponzi was a "financial idiot." On August 2, the Post claimed he
was bankrupt. Then the Post disclosed Ponzi's criminal record and published his mug shots.
On August 10, federal agents shut down the Securities Exchange Company. They did not find
any postal reply coupons. The Hanover Trust Bank was also shut down. Four other banks soon
closed their doors.
Ponzi was arrested by federal authorities on August 13 and charged with 86 counts of fraud. He
was released on a $25,000 bond, immediately arrested by Massachusetts authorities, and released
on another $25,000 bond. There were federal and state civil and criminal trials, bankruptcy
hearings, individual suits against Ponzi, and suits filed by Ponzi.
On November 1, 1920, Ponzi pled guilty to mail fraud and was sentenced to five years in federal
prison. In jail, he continued to receive funds from people who still trusted him.
An estimated 40,000 people (including ¾ of the Boston Police Force) invested $15 million ($140
million in today’s dollars) in Ponzi’s scheme. That was enough to buy some 180,000,000 postal
coupons. Authorities were able to confirm the purchase of only two. Ponzi’s only legitimate
income during the fraud was $45 in dividends from five shares of stock. He had assets of
$1,593,834.12. It took eight years, but investors eventually received 37% of their money back.
Released after serving three and one-half years, Massachusetts sentenced him to nine years. He
was released on a $14,000 bond pending an appeal.
He jumped bail, fled to Florida, purchased worthless land for $16 an acre, subdivided it into 23
lots, sold each for $10, and made $214 per acre. He promised gullible investors who reinvested
their profits that in two years the land would increase in value to $5.3 million. Sentenced to a
year in a Florida prison, he jumped bail on June 3, 1926 and fled to Texas. He disguised his
appearance by shaving his head and growing a mustache and signed on as a crewman on a
merchant ship headed for Italy. He was captured on June 28th when the boat docked in New
Orleans.
Ponzi was returned to Boston, imprisoned, and released after seven years. He was deported to
Italy on October 7, 1934 since he never had become an American citizen. Although his wife
eventually divorced him, they exchanged love letters until Ponzi died.
In Italy, Ponzi worked as an English translator and tried several unsuccessful schemes. In 1939,
he landed a job with Italy’s new airline as the Rio de Janeiro, Brazil branch manager. Ponzi
discovered airline officials using the carrier to smuggle currency. When they refused to give
Ponzi a cut, he tipped off the Brazilian government. During World War II, Brazilian authorities
shut the airline down because it was being used to ship strategic war materials.
Ponzi spent the last years of his life in poverty. He was unsuccessful in running a Rio lodge,
taught English, and received unemployment funds. He had a stroke in 1948, and died in a charity
hospital in Rio de Janeiro on January 18, 1949.
14
Chapter 1: Introduction to Fraud
In the hospital, Ponzi granted an interview to an American reporter: "Even if they never got
anything for it, it was cheap at that price. Without malice aforethought I had given them the best
show that was ever staged in their territory since the landing of the Pilgrims! It was easily worth
fifteen million bucks to watch me put the thing over!"
Because Ponzi’s scheme was so large and so talked about, all subsequent “use money from later
investors to pay earlier investors” frauds have been called Ponzi schemes.
15
Chapter 1: Review Questions
The review questions accompanying each chapter are designed to assist you in achieving the
learning objectives stated at the beginning of each chapter. The review section is not graded; do
not submit it in place of your final exam. While completing the review questions, it may be
helpful to study any unfamiliar terms in the glossary in addition to chapter course content. After
completing the review questions for each chapter, proceed to the review question answers and
rationales.
1. The Association of Certified Fraud Examiners estimates that fraud costs the U.S.:
2. True or false: Fraud is defined as an intentional act of deceit for the purpose of gaining
an unfair advantage that results in an injury to the rights or interests of another person.
A. True.
B. False.
A. Waiting for the opportunity to present itself; a pressure existing; and rationalizing
the act.
B. Committing the theft itself; converting the asset to personal use; and rationalizing
the act.
C. Committing the theft itself; converting the asset to personal use; and concealing
the fraud.
D. Waiting for the opportunity to present itself; converting the asset to personal use;
and concealing the fraud.
4. True or false: Concealing a fraud often takes more time and effort and leaves behind
more evidence than the actual theft does.
A. True.
B. False.
5. An effective way for an employee to hide theft is to charge the stolen item off to:
A. An asset account.
B. A liability account.
C. An equity account.
D. An expense account.
16
Chapter 1: Review Questions
A. Employee fraud.
B. Management fraud.
C. External fraud.
D. Investment fraud.
7. Which of the following would involve acts such as the misrepresentation in or intentional
omission from the financial statements of events, transactions, or other significant
information?
A. Employee fraud.
B. Management fraud.
C. External fraud.
D. Investment fraud.
A. Employee fraud.
B. Management fraud.
C. External fraud.
D. Investment fraud.
17
Chapter 1: Review Question Answers and Rationales
Review question answer choices are accompanied by unique, logical reasoning (rationales) as to
why an answer is correct or incorrect. Evaluative feedback to incorrect responses and
reinforcement feedback to correct responses are both provided.
1. The Association of Certified Fraud Examiners estimates that fraud costs the U.S.:
A. $11 billion a year. This answer is incorrect because $11 billion is what the
Association of Certified Fraud Examiners estimates as the cost of violent crime,
not the cost of fraud.
B. $120 billion a year. This answer is incorrect because the Association of Certified
Fraud Examiners estimates that fraud costs the United States $660 billion a year,
not $120 billion.
C. $660 billion a year. This answer is correct because the Association of
Certified Fraud Examiners estimates that fraud costs the United States $660
billion a year.
D. $900 billion a year. This answer is incorrect because the Association of Certified
Fraud Examiners estimates that fraud costs the United States $660 billion a year,
not $900 billion.
2. True or false: Fraud is defined as an intentional act of deceit for the purpose of gaining
an unfair advantage that results in an injury to the rights or interests of another person.
A. Waiting for the opportunity to present itself; a pressure existing; and rationalizing
the act. This answer is incorrect because the opportunity presenting itself; a
pressure existing; and rationalizing the act are not the three steps a perpetrator
must take to commit most frauds.
B. Committing the theft itself; converting the asset to personal use; and rationalizing
the act. This answer is incorrect because rationalizing the act is not one of the
three steps a perpetrator must take to commit most frauds.
C. Committing the theft itself; converting the asset to personal use; and
concealing the fraud. This answer is correct because with most frauds the
three steps a perpetrator must take are the theft itself, converting the asset to
personal use, and concealing the fraud.
D. Waiting for the opportunity to present itself; converting the asset to personal use;
and concealing the fraud. This answer is incorrect because the opportunity
18
Chapter 1: Review Question Answers and Rationales
presenting itself is not one of the three steps a perpetrator must take to commit
most frauds.
4. True or false: Concealing a fraud often takes more time and effort and leaves behind
more evidence than the actual theft does.
A. True. This answer is correct because concealing a fraud often does take
more time and effort and leave behind more evidence than the actual theft
does.
B. False. This answer is incorrect because it is true that concealing a fraud often
takes more time and effort and leaves behind more evidence than the actual theft
does.
5. An effective way for an employee to hide theft is to charge the stolen item off to:
A. An asset account. This answer is incorrect because balance sheet accounts are not
zeroed out at the end of the year which requires the employee to continue to hide
the fraud year after year.
B. A liability account. This answer is incorrect because balance sheet accounts are
not zeroed out at the end of the year which requires the employee to continue to
hide the fraud year after year.
C. An equity account. This answer is incorrect because balance sheet accounts are
not zeroed out at the end of the year which requires the employee to continue to
hide the fraud year after year.
D. An expense account. This answer is correct because the expense accounts are
zeroed out at the end of the year which limits the employee’s principal
exposure to a year or less.
7. Which of the following would involve acts such as the misrepresentation in or intentional
omission from the financial statements of events, transactions, or other significant
information?
19
Chapter 1: Review Question Answers and Rationales
20
Chapter 2: Who Commits Fraud and Why
When a new fraud is discovered, one of the most frequently asked questions is “Why in the
world did they do it?” The question is asked so frequently because the perpetrator is often a
well-respected employee who seemingly has everything to lose and not much to gain by
committing the fraud. This chapter explains who commits fraud and why they commit it.
Anyone who wants to prevent or detect fraud must understand who it is that commits fraud and
what motivates him or her to do so. We will first discuss what is known about fraud perpetrators
to see if we can build a profile that will help us spot potential perpetrators. We will then turn our
attention to societal forces that contribute to the increase in fraud.
Significant differences were found between the fraud perpetrators and the other property
offenders. Fraud perpetrators:
• Were more likely to be first-time offenders;
• Were less likely to get arrested, convicted, incarcerated, or to serve long sentences;
• Were older (possibly because it usually takes a while to get in a position of
responsibility);
• Were more likely to be women (30 percent, as compared to only two percent of the
property offenders);
• Had a more stable family life (more likely to be married, less likely to be divorced).
• Had more children;
• Were better educated;
• Were more likely to be active church members;
• Were less likely to use alcohol and drugs;
• Were less likely to be criminally inclined or to have a past criminal record; and
• Were in better psychological health. They were more optimistic, kind, empathetic,
socially conforming, and ambitious. They had higher self-esteem, self-control, and self-
sufficiency. They had less depression, self-degradation, impulsiveness, hostility,
dependence, and family discord.
21
Chapter 2: Who Commits Fraud and Why
The researchers found few differences between the fraud perpetrators and the normal population.
As compared to the normal population, the fraud perpetrators were:
• More dishonest;
• More independent;
• More sexually mature;
• More socially deviant;
• More empathetic; and
• Suffered more psychic pain.
Most of the above differences can be explained by the differences in the ages of the two
populations. On average, fraud perpetrators are older than the normal population. Therefore,
you would expect them to be more independent and sexually mature. Also, you might expect
incarcerated fraud perpetrators to be more dishonest, empathetic, and to have suffered more
psychic pain.
This and other studies show that the profile of property offenders, such as bank robbers and
burglars, is different from that of the “normal” population. In contrast, fraud perpetrators tend to
mirror the general public in terms of education, age, religion, marriage, length of employment,
and psychological makeup. In other words, there are not enough differences between fraud
perpetrators and the normal population to distinguish them from the general public.
Many fraud perpetrators are regarded as ideal employees; that is, dedicated, talented, intelligent,
well-educated, and hard-working. Before committing the fraud, they considered themselves to
be honest, upstanding citizens who were valued and respected members of their communities.
This is born out in a study of 212 actual cases of fraud. In that study:
1. Many audit directors responding to the fraud survey stated that the defrauders had to be
among the best employees in order to perpetrate and cover up the fraud while performing
at least satisfactory work.
• Thirty-eight percent of the perpetrators were described as being among the
company’s best employees prior to the detection of the fraud.
• Fifty-nine percent were described as being average employees.
• Three percent were described as being among the worst employees.
2. Most of the perpetrators were between the ages of 26 and 45.
• Fourteen percent were younger than 26.
• Thirty-eight percent were between the ages of 26 and 35.
• Thirty-five percent were between the ages of 36 and 45.
• Thirteen percent were older than 45.
3. Most perpetrators were not able to operate their fraud for very long before they were
caught.
• Fifty-one percent of the frauds were committed for less than a year.
• Twenty-two percent were committed from one to two years.
• Thirteen percent were committed from two to three years.
• Fourteen percent were committed for more than three years.
4. The less time they were employed, the more likely they were to commit a fraud.
• Twenty-six percent were employed less than three years.
22
Chapter 2: Who Commits Fraud and Why
When the results of these two studies are combined, we can conclude that it is relatively difficult
to profile fraud perpetrators or to predict who will move from being an otherwise honest, upright
citizen to becoming a perpetrator of a fraud.
The above profile describes “noncareer” criminals. Recently more “career” criminals have
found fraud to be a lucrative occupation.
Example: FBI director Louis Freeh testified before the Senate Special Committee on Aging that
cocaine distributors in Florida and California are switching to less risky but equally
profitable health-care scams. Their chances for detection are much less than with
trafficking drugs, and the profits are staggering. The bureau has some 1,500 cases
backlogged and would need to double the size of its 249-agent investigative team to
be taken seriously by scam artists who trade in bogus medical cards and phony
insurance claims.
23
Chapter 2: Who Commits Fraud and Why
Example: One executive became a mole for a governmental agency and fed them information
about his employer’s illegal activities. When the case went public and his name was
accidentally disclosed, the whistleblower suffered severe consequences. His
employer charged him with theft, he was fired and locked out of the company’s
headquarters, his name was dragged through the mud by the press and news agencies,
the people in town stopped speaking to him, and his kids were picked on in school by
other children. He finally attempted suicide to escape what was happening.
24
Chapter 2: Who Commits Fraud and Why
Example: In one case, law-enforcement officials did not have a law that dealt specifically with
computer fraud. They had to prosecute using laws written for other purposes.
The problem of an inadequate computer-fraud law was partially resolved in the United States in
1986 when Congress passed the Fraud and Abuse Act. The law makes it illegal to knowingly
gain access to computers with intent to defraud; and buy and sell computer passwords.
The computer fraud is a felony if more than $1,000 of software is damaged or if money, goods,
or services are stolen. The penalties are severe: 1-5 years for the first offense, 10 years for the
second offense; and 20 years for three or more offenses. The range of possible fines is up to
$250,000 or twice the value of the stolen data.
Example: One judge, when sentencing convicted white-collar criminals, stated that all of them
were God-fearing men, highly civic-minded, who have spent their lifetimes in sincere
and honest dedication and service to their families, their churches, their country, and
their communities. He said he could never send them to jail.
Example: A man who stole $1 million from a phone company was sentenced to 40 days in a
work-release program and fined $8,500.
Example: One of the most famous cases of a light sentence was that of C. Arnold Smith. He
was the owner of the San Diego Padres baseball team and was named Mr. San Diego
of the Century. He was very involved in the community and made heavy political
contributions. However, Mr. Smith was also charged with the theft of $200 million
from his bank. He pleaded nolo contendre to the charges and he was given a sentence
of four years probation and a $30,000 fine. The fine was to be paid at the rate of
$100 a month for the following 25 years, with no interest. Mr. Smith was 71 at the
time. The embezzled money was never recovered.
Studies estimate the probabilities of a person going to jail if they commit a fraud. One study
25
Chapter 2: Who Commits Fraud and Why
found:
Χ Fifty-one percent of the perpetrators were prosecuted;
Χ Ninety-eight percent of the prosecutions resulted in convictions;
Χ Thirty-one percent of those convicted were incarcerated; and
Χ Seventy-two percent of those incarcerated received a sentence for a year or more.
Putting those percentages together, only 15.5 percent (0.51 x 0.98 x 0.31) of the detected
perpetrators were prosecuted, convicted, and incarcerated. Only 11 percent (0.51 x 0.98 x 0.31 x
0.72) were incarcerated for a year or more. If we conservatively estimate that only 25 percent of
frauds are detected, then less than four percent of all fraud perpetrators go to jail.
For perpetrators of computer fraud, the odds are even better that they will pull off the fraud
without even being detected. The FBI estimates that only one percent of all computer frauds are
detected.
A study of actual cases of computer fraud showed that only 12 percent are reported to the law.
Eighteen percent of those reported are convicted and imprisoned.
If these estimates represent what actually exists in the world of business, a computer-fraud
perpetrator only has a one in 4,630 chance [1/(0.01 x 0.12 x 0.18)] of being detected, prosecuted,
convicted, and incarcerated. Those are pretty good odds considering that the average loss to
computer fraud is over $500,000.
As illustrated below, these three interrelated forces are referred to as the fraud triangle.
26
Chapter 2: Who Commits Fraud and Why
Pressures
Pressures refer to the non-sharable problems individuals have that motivate them to act
dishonestly. It is a person’s incentive or motivation for committing fraud. Three common types
of pressures that lead to employee fraud are shown in the Employee Pressure triangle
27
Chapter 2: Who Commits Fraud and Why
been stealing 1 percent. Other people are motivated by the challenge of “beating the system” or
subverting system controls and breaking into a system. In one case, a company boasted in its
advertisements that its new information system was so secure that outsiders would not be able to
break into it. Within 24 hours of the system’s implementation, a team of individuals had broken
into the system and left a message that the impenetrable system had just been compromised.
A third type of employee pressure is related to a person’s lifestyle. These include the need for
funds to support a gambling habit (or pay off gambling debts) or support an addiction or problem
with drugs or alcohol. Some people commit fraud to keep pace financially with other family
members. For example, one plastic surgeon, making up to $800,000 a year, defrauded his clinic
of over $200,000 so that he could compete with family members who engaged in a game of
financial one-upmanship.
The three types of organizational pressures that motivate management to misrepresent their
financial statements are shown in the Financial Statement Pressure triangle. The most prevalent
financial pressure is a need to meet or exceed earnings expectations to keep the stock price from
falling. Management can also create significant pressure for themselves with unduly aggressive
earnings forecasts that they then feel they have to meet. They can also create unrealistic
performance standards or incentive programs that motivate themselves and others to falsify
financial results to keep their job or to receive stock options and other incentive payments.
Lastly, industry conditions such as new regulatory requirements or significant market saturation
with declining margins can also motivate fraud.
People often believe these pressures are nonsharable and not solvable in a socially sanctioned
manner. These pressures can become so intense that people feel they have to act and decide that
fraud is the only (or the most satisfactory) solution.
Example: One inmate serving time in prison for fraud described his pressure this way: “I’m
as honest as the next fellow, but I was backed up against the wall. I did not have
any other alternative.”
Opportunities
As shown in the opportunity triangle, opportunity is the condition or situation that allows a
person or organization to do three things: commit the fraud, conceal the fraud, and convert the
theft or misappropriation to personal gain.
1. Commit the fraud. The theft of assets such as cash, inventory, tools, supplies, information,
and computer time and services is the most common type of employee fraud. Most fraudulent
financial reporting consists of the overstatement of assets or revenues, the understatement of
liabilities, or the failure to disclose information.
2. Conceal the fraud. When assets are stolen or overstated, the only way to balance the
accounting equation is to inflate other assets or to decrease liabilities or equity. Unless
perpetrators find some way to keep the accounting equation in balance, their theft or financial
statement misrepresentation can be discovered. Concealment often takes more effort and time
28
Chapter 2: Who Commits Fraud and Why
and leaves behind more evidence than the actual theft or misrepresentation. For example,
taking cash requires only a few seconds, whereas altering records to hide the theft can be
more challenging and time consuming.
A common and effective way to hide a theft is to charge the stolen item to an expense
account. The perpetrator’s exposure is limited to a year or less, because the expense
accounts are zeroed out at the end of the year. On the other hand, perpetrators who hide a
theft by affecting a balance sheet account must continue the concealment. One way to hide a
decrease in assets is a lapping scheme, in which the perpetrator steals the cash or check that
Customer A mails in to pay its accounts receivable. Funds received at a later date from
Customer B are used to pay off customer A’s balance. Funds from Customer C are used to
pay off B, and so forth. Because the theft involves two asset accounts (Cash and Accounts
Receivable) the cover-up must continue indefinitely unless the money is replaced, because
the theft will be uncovered if the scheme is stopped.
In a check kiting scheme, the perpetrator creates cash by taking advantage of the timing lag
between depositing a check and the check clearing the bank. For example, suppose a fraud
perpetrator opens checking accounts in banks A, B, and C. The perpetrator can “create” cash
by depositing a $1,000 check from bank A into bank B and withdrawing the funds. If it takes
two days for his check to clear bank A, he has created $1000 for two days. After 2 days,
since there are insufficient funds in bank A to cover the $1,000 check, the perpetrator
deposits a $1,000 check from bank C to bank A. He has covered the creation of the $1000
for another 2 days. Since bank C also has insufficient funds, $1,000 must be deposited to
bank C before the check to bank A clears. The check to bank C is written from bank B,
which also has insufficient funds. The scheme continues, writing checks and making deposits
as needed to keep the checks from bouncing.
3. Convert the theft or misrepresentation to personal gain. In employee fraud, all fraud
perpetrators go through the conversion phase unless they steal actual cash that can be spent
or use the asset personally. For example, employees who steal inventory and equipment must
sell them or otherwise convert them to cash. When financial statements are falsified, the
perpetrators convert their actions to personal gain through indirect benefits: they keep their
jobs, their stock rises, they receive pay raises and promotions, or they gain more power and
influence.
The list of opportunities that make fraud easy to commit and conceal is almost endless.
Opportunities often stem from internal control factors. For example, a perpetrator may be able to
commit and conceal a fraud because the company did not implement proper controls such as
proper authorization procedures, clear lines of authority, adequate supervision, adequate
documents and records, a system to safeguard assets, or independent checks on performance.
Likewise, there may not be a separation of duties among the authorization, custodial, and record-
keeping functions. Management may allow fraud to occur by not getting involved in designing or
enforcing the system of internal control or through inattention or carelessness. Alternatively, they
may commit the fraud by overriding internal controls or using their position of power to compel
those below them to carry out the fraud. However, the most prevalent opportunity for fraud
results from a company’s failure to enforce its system of internal controls.
29
Chapter 2: Who Commits Fraud and Why
A control feature many companies lack is a background check on all potential employees. This
would have saved one company from the “phantom controller.” In that case, the company
president stopped by the office one night, saw a light on in the controller’s office, and went to
see why he was working so late. He was surprised to find a complete stranger at work. An
investigation showed the controller was not an accountant and had been fired from three of his
previous five jobs in the last 8 years. Because he was unable to do the accounting work, he had
hired someone to come in at night to do his work for him. Before his scam was discovered, the
controller defrauded the company of several million dollars.
There are other factors that provide an opportunity to commit and conceal fraud such as large,
unusual, or complex transactions; numerous adjusting entries at year-end; questionable
accounting practices; pushing accounting principles to the limit; or related-party transactions.
Other factors include incompetent personnel, inadequate staffing, rapid turnover of key
employees, lengthy tenure in a key job, and lack of training. Other opportunities arise when the
company has unclear policies and procedures, fails to teach and stress corporate honesty, and
fails to prosecute those who perpetrate fraud.
Many frauds arise when employees build mutually beneficial personal relationships with
customers or suppliers. For example, a buyer could agree to purchase goods at an inflated price
in exchange for a kickback from the vendor. Frauds can also occur when a crisis arises and the
company disregards its normal control procedures. For instance, one Fortune 500 company was
hit with three multi-million-dollar frauds in the same year. All three took place when the
company was trying to resolve a series of crises and failed to follow the standard internal control
procedures.
Rationalizations
The third element of the fraud triangle is a rationalization that allows perpetrators to justify
their illegal behavior. Rationalization can take the form of a justification of one’s actions (I only
took what they owed me), an attitude (the rules do not apply to me), or a lack of personal
integrity (having what I want is more important than being honest). In other words, perpetrators
rationalize that they are not actually being dishonest, that honesty is not required of them, or that
their reasons for committing fraud are more compelling than honesty and integrity. Some
perpetrators rationalize that they are not hurting a real person; it is just a faceless and nameless
computer system that is affected or a large, impersonal company that will not miss the money.
For example, one perpetrator took pains to steal no more than $20,000, which was the maximum
that the insurance company would reimburse the company for losses.
The list of rationalizations people use is lengthy. Here are some of the most frequent:
Χ I am only “borrowing” the money (or asset) and will repay my “loan.”
Χ You would understand if you knew how badly I needed it.
Χ What I did was not that serious.
Χ It was for a good cause. (The Robin Hood syndrome, robbing from the rich to give to the
poor.)
30
Chapter 2: Who Commits Fraud and Why
31
Chapter 2: Who Commits Fraud and Why
If individuals have a strong generalized honesty characteristic, they may theoretically withstand
the cumulative weight of the other two variables. However, some will argue that everyone has a
price. It is reported that Abraham Lincoln once angrily kicked a man out of his office. When
asked about his actions, Lincoln stated that he had just turned down a substantial bribe. Then he
stated “Every man has his price, and he was getting close to mine.”
A person with personal integrity and little opportunity or pressure to commit fraud will most
likely behave honestly. However, the conditions for fraud become more enticing as individuals
with less personal integrity are placed in situations with increasing pressures and greater
opportunities to commit the crime.
Individuals placed in difficult circumstances may feel that the only way out is to choose between
their integrity and one or more of the following: their business; their positions in the community;
their reputations; or prestige. When they choose to sacrifice their integrity, fraud is often the
result.
In the life of a perpetrator, the three variables contributing to fraud build until they are
sufficiently strong to result in the occurrence of a fraudulent act.
Example: One young lady from a family that believed strongly in sexual abstinence before
marriage became pregnant out of wedlock. She feared the reaction of her parents,
teachers, and peers and felt she could not share her problem with them. At work she
handled a lot of cash and was trusted completely by the owner of the company. She
realized that it would be easy for her to take $500 and pay for an abortion. She
rationalized her actions by telling herself that she was not stealing; she was just
borrowing the money and would pay it back later. The money was never missed, and
soon she was unable to resist this “easy” access to cash. Subconsciously, she decided
that the things she could buy with the embezzled funds were more important than her
integrity. By the time she was caught she had embezzled almost $90,000.
Fraud can be prevented by eliminating or minimizing one or more of the fraud triangle elements.
While there are things companies can do to reduce or minimize pressures and rationalizations,
their greatest opportunity to prevent fraud lies in reducing or minimizing the opportunity to
commit fraud. This is typically done by implementing a good system of internal controls.
To effectively prevent fraud, one must understand the fraud triangle. One must comprehend the
pressures that employees and company management face, the opportunities that allow a person to
commit and conceal the fraud, and the thinking patterns that allow a perpetrator to justify the
dishonest act.
32
Chapter 2: Who Commits Fraud and Why
However, understanding these risk factors is not sufficient. To prevent fraud, you must also
know what you can do to lessen or mitigate each of the three types of risk factors. What you
need is a fraud prevention program.
In the long run, it is much less expensive to have a fraud prevention program than it is to ignore
the problem until a fraud surfaces. If you can prevent a fraud, you:
Χ Minimize losses due to undetected frauds;
Χ Avoid fraud investigation costs;
Χ Do not have to make the tough decision of whether or not to prosecute;
Χ Avoid lawsuits and legal costs; and
Χ You are not distracted from company goals and do not waste time.
One way to develop a fraud prevention program is to follow the risk-assessment strategy shown
below. We will now walk you through the major steps in this strategy. This strategy should be
followed for each risk factor identified.
33
Chapter 2: Who Commits Fraud and Why
Statement on Auditing Standards No. 99 identifies three categories of risk factors that relate to
both misstatements arising from misappropriation of assets and misstatements arising from
fraudulent financial reporting. As mentioned earlier, these three categories are: (i)
pressures/incentives; (ii) opportunities; and (iii) attitudes/rationalizations.
The likelihood or probability that a fraud will actually take place is referred to as fraud risk.
Some risk factors pose a greater risk because the probability of their occurrence is more likely.
For example, employees at a steel mill are more likely to steal cash than coils of steel.
The dollar amount that could be lost if a particular risk factor led to a fraud is referred to as
fraud exposure. Fraud exposure can range from very small to very large, depending on the
nature of the fraud and how long it persists.
Fraud risk and exposure must be considered together. The risk of collusion among top
management resulting in materially misleading financial statements may be very small, but the
exposure can be enormous. It could completely destroy a company and force it into bankruptcy.
On the other hand, the risk of a petty-cash fraud may be much greater, but the exposure is quite
small.
As either fraud risk or exposure increases, the materiality of the fraud risk factor and the need to
protect against it also rise.
All other factors being equal, prevention techniques are superior to detection techniques. By
the time a detection technique identifies a problem, a certain amount of loss may already have
been sustained, and additional cost may be required to correct the problem. If prevention
techniques fail, however, and a fraud occurs, detection techniques are essential to discover the
fraud and recover from it.
Prevention and detection techniques complement each other, and a good fraud prevention program
should employ both.
No fraud prevention program can ever provide an organization with foolproof protection against
all frauds. The cost of a foolproof system is prohibitively high. Since fraud prevention
techniques can negatively impact operational efficiency, having too many of them slows the
system down and makes it inefficient -- restricting a company’s ability to meet its needs.
Therefore, the objective in designing a fraud prevention program is to provide “reasonable
34
Chapter 2: Who Commits Fraud and Why
assurance” that a fraud does not take place. This means the benefit of a fraud prevention
technique must exceed its cost.
Prevention-technique costs are easier to measure than their benefits. The primary cost element is
personnel, and it includes time to perform the prevention procedures; costs of hiring additional
employees to achieve effective segregation of duties; and costs of programming techniques into a
computer system.
Prevention-technique benefits stem from reduced fraud losses. One way to calculate fraud-
prevention-technique benefits involves expected fraud loss, the mathematical product of fraud
risk and fraud exposure:
The benefit of a prevention technique is the difference between the expected loss with the
prevention technique and the expected loss without it.
Once the benefits and costs of a particular control have been estimated, a determination must be
made whether the control is cost-beneficial. To make this determination, the cost of the
prevention technique is subtracted from the benefit.
In evaluating the costs and benefits of prevention techniques, management must employ good
judgment and consider factors other than those reflected in the simple expected-benefit
calculation. For example, a fraud exposure may be so large that it threatens the organization’s
continued existence. In such cases, management should be willing to implement prevention
techniques having a cost higher than the simple reduction in expected loss. This extra cost can
be viewed as an insurance premium to protect the organization against catastrophic loss.
Jim sat on his stool in front of the blackjack table as the waitress offered him his fifth drink. As
the dealer drew another blackjack, Jim knew he was finished. He had just gambled away his
children’s college fund. He quickly downed his last drink, numbing himself for the eventual
confrontation with his wife, Tammy. He stumbled to his hotel room, hoping to wake up and
realize that this evening was nothing more than a nightmare.
While driving back to San Jose from Reno Sunday morning, Jim could not face the
embarrassment. His thoughts turned to coming up with a plan to restore the children’s college
fund before Tammy discovered it was missing. He was sure that if he only had an extra $500, he
could have won the money back. How would he get $500? Jim gave this idea considerable
thought. Before he knew it, he was pulling into his driveway. Tammy greeted him with a smile
and asked how the convention was. Without thought, he swiftly replied, “Oh, it was your usual
convention,” never letting on to his lack of attendance.
Still preoccupied with the loss of the college fund and the need for an extra $500, Jim drove his
late-model Buick to work. At 10:00 a.m., an accounts payable clerk came to his office seeking
35
Chapter 2: Who Commits Fraud and Why
assistance with a problem. The clerk was matching invoices with purchase orders and had found
an invoice for $3,200 that did not match the purchase order. Immediately, Jim knew how he
could get the $500 “loan.” Chips ‘R’ Us was a fast-growing microchip producer whose internal
controls were excellent on paper but were sometimes not followed. Chips ‘R’ Us also had a
policy of paying, without secondary approval, any invoice of $500 or less.
Without much thought, Jim’s plan was in place. He would first set up a dummy company that
would issue an invoice to Chips ‘R’ Us for $500. He knew his winnings would not only replace
the college fund, but would also allow him to repay the company.
Jim could not believe how easy it was to borrow the money. The check showed up in a post
office box he had opened a few days earlier. His next meeting would be in Las Vegas at the end
of the month, but Jim could not wait. He needed to win his children’s money back.
Jim phoned Tammy with the “bad news”: He and the controller would have to fly to Los
Angeles over the weekend to meet with the lawyer over a company matter. Within minutes, he
was in his car driving that familiar road to Reno. It was close to midnight when he arrived. He
wasted no time checking in, then went straight to the craps table. He knew that by 1 a.m. he
would have the college fund back.
By 4 a.m., Jim was not only out of money, but his personal checking account was $600 in the
red. Jim was concerned about this loss, but not as worried as he had been before. He would
simply take out another “loan” from Chips ‘R’ Us.
As Jim went to work Monday morning, he was not his happy-go-lucky self. Feeling guilty about
his unauthorized loan, which was now gone, Jim kept to himself and did not joke with his fellow
employees. On one occasion, Jim stuck his head out of the office door and falsely accused his
secretary of not calling his attention to a memorandum from the controller. This was a rough
time emotionally for Jim; some days he was himself, other days he acted as if he were a
completely different person.
Within six months, Jim had set up two more dummy companies and insisted that accounts
payable clerks not verify any invoice of less than $750, allowing him to meet his ever-increasing
“needs.” No one ever questioned Jim on this new policy because he had worked for the
company for over 10 years and was a “trusted” employee who was respected by those who
worked with him. Soon after the new policy was in place, Jim decided to reward himself for his
“hard work” by buying a new BMW 730i. The office staff was alive with gossip when Jim
drove up in the new car. No one could understand how he could afford such a beautiful
automobile. Jim explained his good fortune to one employee by saying that he was able to put
down a large initial payment with winnings from Reno.
Three years later, Jim had not repaid the “loan” back and was taking more money than ever from
Chips ‘R’ Us. He now had a total of eight dummy companies. He was still convinced that he
would repay the loans, but he had lost track of how much money he had “borrowed.” The
accounts payable personnel had learned to avoid Jim because they never knew what to expect
from him. At times, he seemed to be the nicest guy you would ever meet, but at other times he
36
Chapter 2: Who Commits Fraud and Why
would be uncaring and even critical of others. It seemed that by his own volition, he had
withdrawn socially from others at work.
37
Chapter 2: Review Questions
The review questions accompanying each chapter are designed to assist you in achieving the
learning objectives stated at the beginning of each chapter. The review section is not graded; do
not submit it in place of your final exam. While completing the review questions, it may be
helpful to study any unfamiliar terms in the glossary in addition to chapter course content. After
completing the review questions for each chapter, proceed to the review question answers and
rationales.
3. Which of the following is the probability of a person going to jail if they commit a fraud?
A. 51.0%.
B. 31.0%.
C. 11.0%.
D. 3.9%.
A. A financial pressure.
B. A management characteristic pressure.
C. A lifestyle pressure.
D. An emotional pressure.
38
Chapter 2: Review Questions
6. A scheme in which the perpetrator steals the cash or check that Customer A mails in to
pay its accounts receivable and uses the funds received at a later date from Customer B to
pay off customer A’s balance is known as:
A. Skating.
B. Kiting.
C. Lapping.
D. Dodging.
7. True or false: In employee fraud, all fraud perpetrators go through the conversion phase
unless they steal actual cash that can be spent or use the asset personally.
A. True.
B. False.
9. The likelihood or probability that a fraud will actually take place is referred to as:
A. Fraud risk.
B. Fraud exposure.
C. Prevention risk.
D. Detection risk.
10. True or false: All other factors being equal, detection techniques are superior to
prevention techniques.
A. True.
B. False.
12. True or false: The benefit of a prevention technique is calculated by taking the difference
between the expected loss with the prevention technique and the expected loss without it.
39
Chapter 2: Review Questions
A. True.
B. False.
40
Chapter 2: Review Question Answers and Rationales
Review question answer choices are accompanied by unique, logical reasoning (rationales) as to
why an answer is correct or incorrect. Evaluative feedback to incorrect responses and
reinforcement feedback to correct responses are both provided.
A. Were more likely to get arrested. This answer is incorrect because the study
found fraud perpetrators were less likely to get arrested than other incarcerated
property offenders.
B. Were more likely to be first time offenders. This answer is correct because
the study found fraud perpetrators were more likely to be first time
offenders than other incarcerated property offenders.
C. Were more likely to use drugs and alcohol. This answer is incorrect because the
study found fraud perpetrators were less likely to use drugs and alcohol than other
incarcerated property offenders.
D. Had fewer children. This answer is incorrect because the study found fraud
perpetrators had more children than other incarcerated property offenders.
A. Under the age of 26. This answer is incorrect because the study found that only
14 percent of fraud perpetrators were under the age of 26.
B. Between the ages of 16 and 35. This answer is correct because the study
found that most fraud perpetrators were between the ages of 16 and 35.
C. Between the ages of 36 and 45. This answer is incorrect because the study found
that 35 percent of fraud perpetrators were between the ages of 36 and 45.
D. Older than 45. This answer is incorrect because the study found that only 13
percent of fraud perpetrators were older than 45.
3. Which of the following is the probability of a person going to jail if they commit a fraud?
41
Chapter 2: Review Question Answers and Rationales
A. Commit, conceal, and convert. This answer is incorrect because commit, conceal,
and convert are the three interrelated forces of the opportunity triangle, not the
fraud triangle.
B. Opportunity, rationalization, and pressure. This answer is correct because
the three interrelated forces of the fraud triangle are opportunity,
rationalization, and pressure.
C. Attitude, justification, and lack of personal integrity. This answer is incorrect
because attitude, justification, and lack of personal integrity are the three
interrelated forces of the rationalization triangle, not the fraud triangle.
D. Financial, lifestyle, and emotional. This answer is incorrect because financial,
lifestyle, and emotional are the three interrelated forces of the employee pressure
triangle, not the fraud triangle.
6. A scheme in which the perpetrator steals the cash or check that Customer A mails in to
pay its accounts receivable and uses the funds received at a later date from Customer B to
pay off customer A’s balance is known as:
42
Chapter 2: Review Question Answers and Rationales
7. True or false: In employee fraud, all fraud perpetrators go through the conversion phase
unless they steal actual cash that can be spent or use the asset personally.
A. True. This answer is correct because in employee fraud, it is true that all
fraud perpetrators go through the conversion phase unless they steal actual
cash that can be spent or use the asset personally.
B. False. This answer is incorrect because in employee fraud all fraud perpetrators
go through the conversion phase unless they steal actual cash that can be spent or
use the asset personally or there would be no incentive to commit the fraud.
9. The likelihood or probability that a fraud will actually take place is referred to as:
A. Fraud risk. This answer is correct because fraud risk is defined as the
likelihood or probability that a fraud will actually take place.
B. Fraud exposure. This answer is incorrect because fraud exposure is defined as the
dollar amount that could be lost if a particular risk factor led to a fraud.
C. Prevention risk. This answer is incorrect because prevention techniques are used
to prevent a fraud from occurring and are not related to a likelihood or probability
that a fraud will actually occur.
D. Detection risk. This answer is incorrect because detection techniques are used to
detect a fraud when one has occurred and are not related to a likelihood or
probability that a fraud will actually occur.
10. True or false: All other factors being equal, detection techniques are superior to
prevention techniques.
43
Chapter 2: Review Question Answers and Rationales
A. True. This answer is incorrect because, all other factors being equal, it is better to
prevent a fraud from occurring than to detect it after it has occurred.
B. False. This answer is correct because, all other factors being equal, it is
better to prevent a fraud from occurring than to detect it after it has
occurred.
A. Fraud risk and fraud exposure. This answer is correct because the expected
fraud loss is the mathematical product of fraud risk and fraud exposure.
B. Prevention risk and fraud exposure. This answer is incorrect because the
expected fraud loss is the mathematical product of fraud risk, not prevention risk,
and fraud exposure.
C. Fraud risk and prevention risk. This answer is incorrect because the expected
fraud loss is the mathematical product of fraud risk and fraud exposure, not
prevention risk.
D. Detection risk and prevention risk. This answer is incorrect because the expected
fraud loss is the mathematical product of fraud risk, not detection risk, and fraud
exposure, not prevention risk.
12. True or false: The benefit of a prevention technique is calculated by taking the difference
between the expected loss with the prevention technique and the expected loss without it.
44
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Example: Raymond Keller was the owner of a local grain storage company. He built a lavish
house overlooking the Des Moines River, complete with a swimming pool, sauna,
and a three-car garage. However, for reasons no one really knows, his financial
situation declined. Some say he lost money speculating on the commodities markets.
Others say it was a grain embargo that virtually halted the buying and selling of grain.
Keller had a severe cash shortage and went deeply in debt. He asked some farmers to
wait for their money and gave others bad checks. Finally, the seven banks to which
he owed over $3 million called their loans. He began the unauthorized sale of the
stored grain and used the proceeds to cover his losses. One day a state auditor
appeared unexpectedly. Rather than face the consequences, Keller took his own life.
Example: Tony De Angelis, who perpetrated the Salad Oil Swindle, was known for his
chauffeur-driven Cadillac, his large and risky deals, his influential associates, and his
free-spending habits. He often gave cash away to his many admirers.
Example: One man, after founding a student marketing company, changed his lifestyle
dramatically and developed very expensive tastes. He bought a Lear jet and a very
expensive home, threw extravagant parties, and tried to portray himself as an elitist.
Example: One woman began embezzling funds when her husband went on a spending spree
after a marital squabble. She felt compelled to cover the checks he wrote.
45
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Inadequate Compensation
Another financial pressure is “inadequate” compensation. The following are some examples of
this type of pressure.
• Some employers expect an employee to maintain a certain lifestyle to foster a certain
image or engage in certain activities to bring in new business, yet these same employers
do not provide an adequate income or expense account to enable the employee to do so.
In such cases, the employee often faces the choice of not meeting company expectations
of finding other funds to achieve the objective.
Example: A partner in a national CPA firm felt he was expected to frequently wine and dine
clients and potential clients. As a result he seriously overextended himself
financially. When an important client offered him a bribe to hide fraudulent financial
reporting, he agreed to look the other way. For a $150,000 payment, he concealed a
$300 million fraud. As a result, a large savings and loan failed, as well as several
other companies.
• Employees do not receive sufficient wages to meet their family’s perceived needs.
Example: Tom was the head shipper at a large manufacturer of gas appliances and related
equipment. He had to support his wife and nine children on a small salary. The
pressures of family expenses finally became so great that he began stealing small
appliances and fixtures from the warehouse. He sold the items and bought all kinds
of things his family needed at home.
• Some people do not feel they are adequately rewarded for their efforts and labors.
Example: Two brothers who ran a software store in Pakistan wrote a computer virus and
inserted it in the software they sold. After the virus damaged the user’s system, it left
a message directing the user to call the brothers for costly corrections. It infected
over 100,000 computers before it was eradicated. When asked about their motives,
the brothers said they were upset that computer users were illegally copying the
store’s legitimate software, so they caused the virus to be activated when an illegal
copy of the software was made.
In essence, the perpetrators come to believe that solving the above pressures is more important
than personal integrity. In other words, the perpetrators would prefer to commit a fraud than lose
46
Chapter 3: Fraud Prevention: Pressures and Rationalizations
their home or business or go bankrupt. The perpetrators may not consciously make this decision,
but their actions reveal what is most important to them.
Example: The controller of a small bank embezzled $158,000. Prior to working at the bank, he
had worked for one of the then-Big Six firms and had earned a CPA certification. He
was the son of a judge, and had never stolen anything before. When interviewed, he
indicated that he had committed the fraud for two reasons: (i) he had gotten a divorce
and had two households to support; and (ii) his outside business was losing money
and draining his personal funds.
Example: Alex was the 47-year-old treasurer of a credit union. His monthly payments on his
home, cars, five different credit cards, two side investments, and college for two
children exceeded his take-home pay. He felt the only way to make ends meet was to
commit a fraud. He misappropriated assets to help pay his crushing debts and
defrauded the credit union of $160,000 over a seven-year period. He was very well
respected, so his actions came as a great surprise to all who knew him.
Greed
Some people have an overwhelming desire for personal gain. Others have a compelling desire to
“get something for nothing.” Put another way, some people are so greedy they will commit a
fraud to get what they want.
Example: As a youngster, Gene found that baseball cards had value, so he took quarters from
his mother’s purse to buy chewing gum, hoping for cards other boys would want to
buy or trade. The prospect of getting something for nothing intrigued him, and he
began pitching pennies, organizing sports pools, and gambling. He talked neighbors
into letting him turn in magazine entry sweepstakes, agreeing to split the winnings.
He did little in high school, conning many teachers into giving him A’s, and
accepting F’s from the others. After high school, he moved from job to job, looking
for a way to “score big” and set himself up for life. Soon after his second child was
born, a racetrack insider alerted him to a racehorse that was a “sure thing.” Gene bet
all of his savings and the proceeds of a second home mortgage on the horse. It came
in fifth. Gene called his wife from the racetrack, told her how he had defrauded her,
and disappeared. His wife lost her house and car. Her parents refused to help her
(they disapproved of her marriage). She had to take a minimum-wage job and felt
bitter, betrayed, and abused.
Example: In 1985, Phillip Capella won $2.7 million in the lottery, and began receiving
annual payments of $135,000. In 1989, he filed a federal income tax return claiming $65,000 in
gambling losses and seeking a $26,000 refund. The IRS audited him, and his accountant showed
up at the audit with 200,000 losing lottery tickets. However, the tickets did not belong to
Capella; he had rented them for $500 from a man who collected losing tickets. Capella and the
47
Chapter 3: Fraud Prevention: Pressures and Rationalizations
accountant were charged with conspiracy and each faced a possible eight-year jail term and fines
of $500,000.
48
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Example: In a recent survey, 98 percent of the CEOs at the top 1,000 Canadian companies
stated they felt that economic pressures were the main reason for Canadian companies
reporting fraud-related losses of $39 million.
When faced with the choice of either losing their businesses and everything they have worked
for over the years or “fudging” (in their eyes) the numbers a little bit in order to keep the
business going, many owners choose the latter course. In the latest recession, business failures
increased 50 percent. The dollar liabilities associated with business failures skyrocketed from
$55 billion to almost $110 billion.
Example: In 1989, Bonneville Pacific, facing a net loss of $2.5 million, badly needed a deal to
meet investor earnings expectations and to avoid a poor showing during discussions
with underwriters for a debt or equity offering. To meet those earnings expectations,
it recognized a $13.2 million gain on a complex, two-step purchase and sale of assets.
The bankruptcy trustee claimed the transaction was a sham to artificially boost the
value of assets assigned to Bonneville. He said it involved insider dealing, inflated
earnings, and secret funneling of cash through an offshore shell. An auditor with
Bonneville’s then-Big Six CPA firm wrote in a memo that the transaction presented
an unusual audit risk to the CPA firm. The memo also criticized Bonneville officials
for accepting such unusual risk, for offering overly optimistic public projections of
earnings, for using aggressive accounting policies, and for trying to promote the
company and increase stock prices. Notwithstanding the memo, the CPA firm gave
Bonneville a clean opinion.
Example: The Equity Funding Fraud was one of the largest computer-assisted frauds in history.
In 1969, Equity Funding’s stock sold for over $80, but because of difficult times in
the insurance industry the stock fell to $12 by late 1970. Company managers with
vast holdings of the stock were intent on boosting its price. They felt that the only
way to do that was through higher and higher earnings. Unfortunately, new sales
were down for the industry and existing policyholders were not renewing their
49
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Example: William Nashwinter, a young aggressive salesman with Doughtie’s Foods, was
promoted to be the general manager of an East Coast warehouse that wholesaled
frozen food products to retail outlets. When he did not meet the profit goals
Doughtie’s set for the warehouse, he was severely criticized. After several such
criticisms he decided to do whatever it took to meet what he felt were Doughtie’s
totally unrealistic profit goals. He inflated the monthly inventory balance he sent to
Doughtie’s in order to decrease his cost of goods sold and inflate his gross profit.
Unfortunately, warehouse performance never improved, and his scheme required him
to fabricate ever-larger amounts of inventory to meet his goals. When he finally
confessed his wrongdoing, the investigating CPA firm found that in the last year of
the fraud, net income was inflated by 39 percent. In essence, Nashwinter decided it
was better to be dishonest than to not meet the budget.
50
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Work-Related Pressures
Pressures can also be work-related. Some of the more frequently encountered work-related
pressures are discussed below.
Severe Resentment
Feelings of anger and resentment have caused some perpetrators to compromise their personal
integrity. Anger and resentment can build until it eventually dominates feelings, and thinking
becomes cloudy. Reason is replaced by a desire to get even or to strike back, caution is thrown
to the wind, and perpetrators take their feelings out on the company by committing a fraud.
Feelings of resentment may arise from various perceptions the employees have about their
workplace. Examples of such perceptions are listed below.
• They are treated unfairly.
51
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Example: A long-time employee who had compiled a good record at work was passed over for
a raise he felt he had earned. When the raise did not materialize, he decided to take
matters into his own hands. He calculated that the average raise had been 10 percent,
so he increased his salary by that amount. When he was finally apprehended he
defended his actions as being honest. He could not understand why he had been
arrested; he had not stolen, he had merely taken what was rightfully his. When asked
how he would have felt if he had increased his salary by 11 percent, he responded that
he would have been stealing one percent.
Example: One fraud perpetrator began his career as a staff accountant at a defense contractor.
The president of the company was a workaholic and considered an eight-hour day as
something a part-time employee worked. To make his mark in the company, the man
worked 12 to 14 hours each day. After six years at the company, he finally realized
that his long workdays were now expected of him, and he would never be able to get
out of the rat race. He became bitter about being taken advantage of (he had never
received any overtime) and about the lack of appreciation for his years of dedicated
work. To get back at the company, he colluded with a vendor to overcharge the
company $1.5 million. The $80,000 he received from the vendor was his
appreciation and “payback.”
52
Chapter 3: Fraud Prevention: Pressures and Rationalizations
employees have done and motivates them to try to cover up poor performances to make
themselves look better.
Example: One executive at a management training company was placed on probation as a result
of poor evaluations from conference participants. In order to save her job, she
removed the poor evaluations and replaced them with much better evaluations. This
deception went on for some time until a participant complained in person to the
president of the company.
Lifestyle Pressures
Another type of pressure is referred to as a lifestyle pressure, such as gambling, a drug or alcohol
problem, or an expensive sexual relationship.
Gambling
Those addicted to gambling will go to great lengths to get the money needed to feed their
addiction. This is perhaps best illustrated by a few examples.
Example: Bernie, a New York lawyer, was a compulsive gambler. To feed his high-betting
habits, he would buy a block of shares in a penny-stock company. He then paid
several brokers to bid up the price so he could unload his shares. On one occasion, he
pulled off dozens of scams and made millions of dollars on each one. Bernie loved to
gamble in Vegas and bet on the horses. On one occasion, he flew to Las Vegas with
$17,000 in racetrack winnings. After several hours, he built his stake up to $110,000.
He put it in a safe-deposit box at the hotel, intent on using it to pay his unpaid
mortgage and other large debts. Unable to sleep with all that gambling going on
below, Bernie got up and went back to the tables. He lost everything and even went
$25,000 in debt to the casino. It was not until Bernie was on his way home that he
realized he was sick and that no matter how much he won, it would never be enough.
Americans legally bet over $500 billion a year. Approximately 13 million people in the U.S. are
addicted to gambling, and it is virtually impossible to tell who they are. There have been other
reports of people hooked on gambling. Consider the following:
• Terry A.: “When I was at the blackjack table, my wife could have been dying from
cancer, and I could not have cared less.”
• Marge W.: “I stole vacation money from the family jar. I spent every waking hour
thinking about getting to the track.”
53
Chapter 3: Fraud Prevention: Pressures and Rationalizations
• Thomas J.: “Gambling was the ultimate experience for me -- better than sex, better than
any drug. I had withdrawal tortures just like a heroin junkie.”
• Ronald P.: “I degraded myself in every way possible. I embezzled from my own
company, I conned my six-year-old out of his allowance.”
• Archie K.: “After I woke up from an appendectomy, I sneaked out of the hospital, cashed
a bogus check and headed for my bookie. I was still bleeding from the operation.”
• Irving J.: “I’ll never forget coming home from work at night, looking through the window
at my family waiting for me and then leaving to place a couple more bets. I was crying
the whole time, but I had simply lost all control.”
Sexual Relationships
A number of people have been motivated to commit a fraud because they needed extra funds to
support one or more intimate relationships.
Example: The former president of United Way, William Aramony, was found guilty of 25
counts of fraud. Mr. Aramony was described by prosecutors as a womanizer who
spent freely and had his staff use creative coding to bill United Way for his and his
girlfriends’ vacations, gambling, and other excesses.
Example: Janet was a 19-year-old cashier at a wholesale candy distributor. Her unemployed
boyfriend Alfred began insisting that Janet get some money to help him make his car
payments and pay his bills. She began stealing cash receipts and destroying the
copies of the invoices that recorded the sales. Soon Alfred pressured her for money
for hotel rooms, transportation, meals, and entertainment for their vacations, which
were always first-class. She was discovered when her need for cash got so large that
she began substituting some customer’s checks for money she took from the drawer.
54
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Example: In one case, a company advertised a new system as being so secure that outsiders
would not be able to break into it. Within 24 hours of implementing the system, a
team had broken into the system and left a message that the impenetrable system had
just been compromised.
Rationalizations
Most fraud perpetrators have justifications or rationalizations that allow them to justify their
illegal behavior. Because they judge themselves by their intentions and not their actions, many
perpetrators consider themselves honest and upright citizens. That means they had to have:
Χ Some internal mechanism that allows them to rationalize their actions as not actually
being wrong or dishonest; or
Χ A reason or an excuse that made their actions more important than honesty and integrity.
Their rationalization allows them to violate their position of trust and still have that violation be
consistent with their concept of themselves as honest people. As an example of the
rationalization process perpetrators use, consider the following statements by a professional car
thief.
Example:What I do is good for everybody. I create work; I hire men to find customers, paint
and deliver the cars, work on the numbers, prepare the car papers, and drive them out
of the state. That is good for the economy.I am also helping people get what they
could never afford otherwise. A fellow wants a Cadillac but cannot afford it. He buys
my cars and saves as much as $2,000. Now he is happy and so is the guy who lost his
car because he gets a nice new Cadillac from the insurance company. The Cadillac
company is happy because they sell another car. The only ones who do not do well
are the insurance companies. But they are so big that nobody cares personally.
Besides, they have a budget for this sort of thing. Come on now -- who am I really
hurting?
55
Chapter 3: Fraud Prevention: Pressures and Rationalizations
• Business is business.
• Above-the-rules syndrome.
• The company owes it to me.
• Personal advancement -- To be somebody, I must have money. Something (honesty and
reputation) has to give in order for me to be successful.
• Everybody is a little dishonest.
On the one hand, it is not possible for you to eliminate or minimize an employee’s self-imposed
situational pressures, nor is it possible or even desirable to remove all company-applied
situational pressures from employees. It is also wrong and illegal for companies to invade the
privacy of their employees. On the other hand, you cannot deter and detect fraud unless you are
aware of the situational pressures compelling employees to commit fraud and reduce them
wherever possible. To be aware of both the self-imposed and the company-applied situational
pressures means that you must:
• Pay more attention to employee lifestyles and habits than you have in the past;
• Select individuals with high levels of moral integrity to occupy important positions of
trust; and
• Strive to create an environment that contributes to maintaining high levels of personal
integrity.
This is easy to say and hard to do. Many of the self-imposed situational pressures arise from an
employee’s financial troubles. However, company managers generally do not know the financial
condition of their employees. Even if they knew certain employees were overextended, managers
would probably feel very reluctant to approach them and talk about it. Furthermore, approached
employees might resent the company sticking its nose where they feel it does not belong.
Prevention Techniques
The following paragraphs list some of the most important things that can be done to minimize or
monitor situational pressures in order to deter fraud.
56
Chapter 3: Fraud Prevention: Pressures and Rationalizations
to talk to. If employees feel they can talk freely, managers will understand their
pressures before they become acute.
• Policies with respect to working conditions, compensation, job incentives, and career
advancement can be a powerful force in encouraging efficiency and loyal service.
Example: One large employee fraud was detected when an auditor noticed that an office
manager took everyone in a limo to an expensive restaurant for lunch on her birthday.
An investigation showed her salary would not support that expense and that she was
paying for these and other extravagances with embezzled funds.
57
Chapter 3: Fraud Prevention: Pressures and Rationalizations
• Review professional material, such as the Audit Risk Alert. A number of CPA firms
have conducted fraud surveys or have published literature on fraud. In addition, the
Association of Certified Fraud Examiners puts out a periodic newsletter on fraud-related
issues.
58
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Some individuals have developed a general trait of honesty that we call “high personal integrity.”
Whether these people are honest depends on the specifics of the situation.
Individuals lacking this trait of honesty may or may not behave correctly, depending on the
situational pressures and opportunities. These people are situationally specific honest.
• Their integrity does not generalize across situations and is not internalized as a personal
value.
• Their behavior is influenced more by the situation:
o The opportunity to be dishonest;
o The probable gain from cheating;
o The likelihood of getting caught;
o The severity of the punishment; and
o The perceived need for more money.
• Usually most individuals believe in honesty, but some can be tempted by convenient
opportunities and intense situational pressures.
Fraud research suggests that a lack of personal integrity is one of the best personality predictors
of fraud perpetrators. People with low personal integrity are usually not concerned with what is
fair and just. Instead, they compromise their standard of honesty and choose what is expedient
or advantageous at the moment, with little regard to future consequences. They consistently
value money or profit above ethics, honesty, morality, and other ideals.
Prevention Techniques
However, as individuals adopt and internalize a high standard of personal integrity, the
probability that they will commit a fraud is reduced. The following prevention techniques will
help minimize rationalizations and maximize employee honesty.
59
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Example: Many professionals see nothing wrong with utilizing corporate computer resources
for personal use. Likewise, gaining unauthorized access to another company’s
databases and browsing through them is not an uncommon practice. One
programmer, when arrested for unauthorized browsing, was shocked to find out that
he was going to be prosecuted for his “crime.” He felt his activities were a common
industry practice.
• Make sure all employees know and understand company rules and standards.
• Adopt an explicit code of conduct that tells employees exactly what is acceptable and
what is not. Require employees to read, sign, and follow it.
Defining appropriate behavior would remove any uncertainty regarding the legality or
appropriateness of questionable practices such as borrowing company material; padding expense
accounts; accepting favors from suppliers; and using company computers, copiers, or telephones
for personal purposes.
60
Chapter 3: Fraud Prevention: Pressures and Rationalizations
• Consistently reward and encourage honesty and give verbal labels to honest and
dishonest behavior. If companies simply punish or reward honesty without giving it a
label or explaining the principle, or if the standard of honesty is inconsistent, employees
will most likely be inconsistent in their moral behavior.
In doing so, they inadvertently send a message to their other employees that dishonesty does not
carry any serious consequences at the company other than termination. As a result, fraud is
psychologically easier to commit when employees believe perpetrators will not be prosecuted.
And termination, where the reasons for termination are not disclosed, in today’s mobile society
can actually help a perpetrator build what others may consider an attractive resume.
All dishonest acts should be thoroughly investigated, and all who are found guilty should be
dismissed. It may not be financially expedient to prosecute everyone caught for dishonesty, but if
no one is ever prosecuted or if people think no one is ever prosecuted, the probability of fraud
will increase. Enough dishonest employees must be prosecuted to create the belief that fraud
perpetrators will be caught and punished.
Example: When one company changed its attitude from “we want to approve when someone is
prosecuted” to “we want to know when someone who commits a fraud is not
prosecuted,” fraud decreased substantially.
The consequences of violating the rules and the punishment of fraud perpetrators should not be
kept secret.
One way to avoid disgruntled employees and to maintain high company morale is to provide
grievance channels and employee counseling. Employees need someone outside the normal
chain of command to talk to about their grievances and problems with the company. Having
someone who will listen to them and help them resolve their problems can significantly decrease
the number of dissatisfied employees. This is often not easy to accomplish since most
employees fear that airing their feelings could have negative consequences for their careers.
61
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Though he has confessed to embezzling funds from six different employers over a 20-year
period, he has never been prosecuted and has never been incarcerated. In large part, Miller’s
freedom is the result of the fear that companies have about turning in employees who defraud
them.
Miller’s first employer was also his first victim. In 1965, after 10 months of selling insurance in
Wheeling, W. Va., he was fired for stealing about $200. After an assortment of odd jobs, he
moved to Ohio and worked as an accountant for a local baker. Miller was caught embezzling
funds and paid back the $1,000 he had stolen. He was not reported to the authorities in either
instance and was quietly dismissed.
62
Chapter 3: Fraud Prevention: Pressures and Rationalizations
Miller returned to Wheeling and went to work for Wheeling Bronze, Inc., a bronze-castings
maker. In December 1971, the president of Wheeling Bronze discovered that several returned
checks were missing and that there was a $30,000 cash shortfall. After an extensive search,
workers uncovered a number of canceled checks with forged signatures in an outdoor sandpile.
Miller was questioned and confessed to the scheme. He was given the choice of paying back the
stolen amount or going to jail. His parents took out a mortgage on their home to pay back the
stolen money. No charges were ever filed, and Miller was dismissed.
Several months later, Miller found a job in Pennsylvania working for Robinson Pipe Cleaning.
When Miller was caught embezzling funds, he again avoided prosecution by promising to repay
the $20,000 he had stolen.
In 1974, Crest Industries hired Miller as an accountant. He proved to be the ideal employee and
was quickly promoted to the position of office manager. He was very dedicated, worked long
hours, and did outstanding work. Soon after his promotion he purchased a new home, a new car,
and a new wardrobe.
In 1976, Miller’s world unraveled again when Crest’s auditors discovered that $31,000 was
missing. Once again there was a tearful confession and a promise to repay all money stolen.
Miller confessed that he had written several checks to himself and had then recorded payments to
vendors on the carbon copies of the checks. To cover his tracks, he intercepted and altered the
company’s monthly bank statements. He had used the money he had stolen to finance his
lifestyle and to repay Wheeling Bronze and Robinson Pipe Cleaning. He claimed in his
confession that he had never before embezzled funds.
He showed a great deal of remorse, so much so that Crest even hired a lawyer for him. He gave
Crest a lien on his house, and he was quietly dismissed. Because the president of Crest did not
want the publicity to harm Miller’s wife and three children, Crest never pressed charges against
him.
Next, Miller took a job as an accountant in Steubenville, Ohio, with Rustcraft Broadcasting
Company, a chain of radio and TV stations. Rustcraft was acquired in 1979 by Associated
Communications, and Miller moved to Pittsburgh to become Associated’s new controller. He
immediately began dipping into Associated’s accounts. Over a six-year period he embezzled
approximately $1.36 million, $445,000 of that in 1984 when he was promoted to CFO.
Miller used various methods to embezzle the money. One approach to circumvent the need for
two signatures on every check was to ask another executive who was leaving on vacation to sign
several checks “just in case” the company needed additional cash while he was gone. Miller
used most of these checks to siphon funds off to his personal account. To cover the theft, he
retrieved the canceled check from the bank reconciliation and destroyed it. The amount stolen
was then charged to an expense account of one of the units to balance the company’s books.
While working at Associated, Miller was able to lead a very comfortable lifestyle. He bought a
new house and several expensive cars. He bought vacation property and a very expensive
63
Chapter 3: Fraud Prevention: Pressures and Rationalizations
wardrobe, and he was very generous with tips and gifts. The lifestyle could not have been
supported by his $130,000 salary, yet no one at Associated ever questioned the source of his
conspicuous consumption.
Miller’s lifestyle came crashing down in December 1984 while he was on vacation. A bank
officer called to inquire about a check written to Mr. Miller. An investigation ensued, and Miller
confessed to embezzling funds. As part of the 1985 out-of-court settlement with Miller,
Associated Communications received most of Miller’s personal property.
After leaving Associated, Miller was hired by a former colleague at Associated. He underwent
therapy and believed he had his problem with compulsive embezzlement resolved. He could not
explain why he was never prosecuted. Whenever he got caught, he always insisted that he was
going to pay the company back. Such statements would usually satisfy his employers and get
him off the hook. However, he believed that these agreements actually contributed to his
subsequent thefts. For example, one rationale for starting to steal from a new employer was to
pay back the former one.
When interviewed about his past activities, Miller said that he felt his problem with theft was an
illness, just like alcoholism or compulsive gambling. The illness was driven by a subconscious
need to be admired and liked by others. He thought that by spending money, others would like
him. Ironically, he was universally well-liked and admired at each job, and it had nothing to do
with money. In fact, one colleague at Associated was so surprised at the news of the thefts that
he said it was like finding out one’s brother was an ax murderer. In the interview, Miller also
claimed that he was not a bad person. He said he never intended to hurt anyone, but once he got
started, he just could not stop.
64
Chapter 3: Review Questions
The review questions accompanying each chapter are designed to assist you in achieving the
learning objectives stated at the beginning of each chapter. The review section is not graded; do
not submit it in place of your final exam. While completing the review questions, it may be
helpful to study any unfamiliar terms in the glossary in addition to chapter course content. After
completing the review questions for each chapter, proceed to the review question answers and
rationales.
1. Which of the following pressures would result from high medical bills?
2. In a recent survey, which pressure did 98 percent of the CEOs at the top 1,000 Canadian
companies state as the main reason for Canadian companies reporting fraud-related losses
of $39 million?
3. Which of the following pressures is evidenced by things such as declining stock prices,
delisting or suspension of stock, credit downgrades by rating agencies, and frequent or
increasing numbers of business failures?
4. Which of the following is one of the many red flags that appear due to management-
related pressures?
5. Which of the following work related pressures results when superiors are not appreciative
of their employees, there are substandard working conditions, or where there are
significant feelings of ill will, resentment, anger, or alienation?
A. Severe resentment.
65
Chapter 3: Review Questions
A. Severe resentment.
B. Threat of job loss.
C. Drug or alcohol addiction.
D. Rapid change in an industry.
7. True or false: Very few fraud perpetrators have justifications or rationalizations that
allow them to justify their illegal behavior.
A. True.
B. False.
10. True or false: Dismissing dishonest employees rather than prosecuting them
inadvertently sends a message to other employees that dishonesty does not carry any
serious consequences at the company other than termination.
A. True.
B. False.
66
Chapter 3: Review Question Answers and Rationales
Review question answer choices are accompanied by unique, logical reasoning (rationales) as to
why an answer is correct or incorrect. Evaluative feedback to incorrect responses and
reinforcement feedback to correct responses are both provided.
1. Which of the following pressures would result from high medical bills?
2. In a recent survey, which pressure did 98 percent of the CEOs at the top 1,000 Canadian
companies state as the main reason for Canadian companies reporting fraud-related losses
of $39 million?
A. Economic cycles, inflation, and recession. This answer is correct because the
survey showed that the CEOs felt that economic cycles, inflation, and
recession was the main reason for companies reporting fraud-related losses.
B. Impending business failures. This answer is incorrect because the survey did not
show that the CEOs felt that impending business failures was the main reason for
companies reporting fraud-related losses.
C. Urgent need for earnings. This answer is incorrect because the survey did not
show that the CEOs felt that an urgent need for earnings was the main reason for
companies reporting fraud-related losses.
D. Unfavorable economic conditions. This answer is incorrect because the survey
did not show that the CEOs felt that unfavorable economic conditions were the
main reason for companies reporting fraud-related losses.
3. Which of the following pressures is evidenced by things such as declining stock prices,
delisting or suspension of stock, credit downgrades by rating agencies, and frequent or
increasing numbers of business failures?
A. Economic cycles, inflation, and recession. This answer is incorrect because the
economic cycle and the resulting effects of inflation and recession are a major
management fraud pressure but includes both favorable as well as favorable
economic conditions.
B. Impending business failures. This answer is incorrect because although business
failures significantly increase in recessionary times, there is a significant
67
Chapter 3: Review Question Answers and Rationales
relationship between impending business failures and fraud even in the best of
times.
C. Urgent need for earnings. This answer is incorrect because although companies
that face pressures to meet certain earnings levels are sometimes motivated to
fabricate those earnings, it is not evidenced by declining stock prices, delisting or
suspension of stock, credit downgrades by rating agencies, and frequent or
increasing numbers of business failures evidence unfavorable economic
conditions.
D. Unfavorable economic conditions. This answer is correct because declining
stock prices, delisting or suspension of stock, credit downgrades by rating
agencies, and frequent or increasing numbers of business failures evidence
unfavorable economic conditions.
4. Which of the following is one of the many red flags that appear due to management-
related pressures?
5. Which of the following work related pressures results when superiors are not appreciative
of their employees, there are substandard working conditions, or where there are
significant feelings of ill will, resentment, anger, or alienation?
68
Chapter 3: Review Question Answers and Rationales
7. True or false: Very few fraud perpetrators have justifications or rationalizations that
allow them to justify their illegal behavior.
A. True. This answer is incorrect because most fraud perpetrators have justifications
or rationalizations that allow them to justify their illegal behavior.
B. False. This answer is correct because most fraud perpetrators have
justifications or rationalizations that allow them to justify their illegal
behavior.
69
Chapter 3: Review Question Answers and Rationales
10. True or false: Dismissing dishonest employees rather than prosecuting them
inadvertently sends a message to other employees that dishonesty does not carry any
serious consequences at the company other than termination.
70
Chapter 4: Fraud Prevention: Opportunities
An opportunity is the condition or situation that allows a person to commit and conceal a
dishonest act. Like situational pressures, opportunities do not in and of themselves cause fraud.
Individuals can choose to behave honestly; many people successfully resist temptations to
commit fraud in spite of the opportunity. However, the probability of fraud increases as the
opportunities become more abundant and more convenient. This section of the chapter discusses
some of the more important risk factors that make fraud more likely to occur. It also illustrates
many of these risk factors with real-life examples. Finally, one or more fraud prevention
techniques are presented for each risk factor. Implementing these prevention techniques will
significantly reduce the risk of a fraud occurring.
It should be noted that one of the most important prevention techniques is performing extensive
auditing procedures; however, specific auditing procedures for each risk factor are not discussed
in the course materials.
Risk Factors
These factors are among the most crucial:
• Inadequate internal control;
• Non-enforcement of internal control; and
• Inadequate monitoring of significant controls.
The most significant opportunity risk factor in most frauds is not enforcing existing internal
controls. Other major factors are the absence of adequate internal controls and overriding
existing internal controls.
Example: The Perini Corporation did not adequately control company checks, even though they
were repeatedly encouraged to do so by their outside auditors. As a result they lost
$1,150,000.
Perini did not control access to blank checks; it stored unused checks in an unlocked
storeroom that every clerk and secretary had access to. Checks were written using a
check-writing machine that automatically signed the president’s name. The machine
dumped signed checks into a box that was supposed to be locked, and the key was
supposed to be controlled by an employee from a different department. However, no
such employee was assigned, and the box was not kept locked, nor did anyone pay
attention to the machine’s counter, which kept track of the number of checks written,
so that the number of checks could be compared with the number of vouchers
71
Chapter 4: Fraud Prevention: Opportunities
authorized for payment. These and other inadequacies in control made the theft quite
easy to commit.
Prevention Techniques
• Develop strong internal control -- The best way to deter fraud is to design, implement, and
enforce sufficient controls to make fraud difficult to perpetrate. The internal control should
include controls for authorizations, clear lines of authority, independent checks on
performance, appropriate documents and records, and physical safeguards. Likewise, there
should be a separation of duties between the authorization, custodial, and record-keeping
functions. The lack of these controls is itself a risk factor.
Internal control should contain:
o Preventive controls to deter fraud;
o Detective controls to discover fraud soon after it occurs; and
o Corrective controls to remedy the problems caused by the fraud.
The overall responsibility for secure and adequate internal control lies with top
management. Management must also establish procedures to ensure that the controls are
complied with and enforced.
• Controls are much more effective when placed in a system as it is built, rather than as an
afterthought. There should be controls to ensure enforcement of internal control and
controls to ensure that internal control is not overridden.
• Management should be involved in the design and monitoring of controls.
If two of these three functions are the responsibility of a single person, problems may arise.
Example 1: The former city treasurer of Fairfax, Va., was convicted of embezzling $600,000
from the city treasury. Her scheme worked as follows:
When residents used cash to pay their taxes, she would keep the currency. She
recorded tax collections on her property tax records but did not report them to the city
72
Chapter 4: Fraud Prevention: Opportunities
controller. Eventually, an adjusting journal entry was made to bring her records into
agreement with those of the controller. When cash was received to pay for business
license fees or court fees, it would be recorded on a cash register and deposited at the
end of each day. She stole portions of this currency but made up discrepancies in the
bank deposit by substituting miscellaneous checks received in the mail that would not
be missed when they went unrecorded. In this example, one person was responsible
both for the custody of cash receipts and for the recording of those receipts. As a
result, the city treasurer was able to divert cash receipts and falsify the accounts to
conceal the diversion.
Example 2: The utilities director of Newport Beach, Calif., was charged with embezzling $1.2
million. He forged invoices or easement documents (for example, for the rights to put
a water line through a person’s land) authorizing payments to a real or fictitious city
property owner. Finance-department officials gave him the checks to deliver to the
property owners. He would then forge signatures, endorse the checks to himself, and
deposit them in his own accounts. The control weakness in this case was that the
utility director was given physical custody of checks relating to transactions that he
had also authorized. This enabled him to authorize fictitious transactions and divert
the city’s payments.
Example 3: The former payroll director of the Los Angeles Dodgers pleaded guilty to
embezzling $330,000 from the team. He would credit employees for hours not
worked and then receive a kickback of around 50 percent of their extra compensation.
He also added fictitious names to the Dodgers payroll and cashed their paychecks.
Since the perpetrator was responsible for both authorizing the hiring of new
employees and for recording employee hours worked, he did not need to prepare or
handle the actual paychecks. The club treasurer would simply mail the checks to an
address specified by the payroll director. The fraud was discovered when the payroll
director became ill, and another employee took over his duties.
Prevention Techniques
• Design and enforce internal control that incorporates adequate separation of duties.
• Design clear and proper authorizations procedures.
• Use the computer to help segregate duties -- In modern information systems, the
computer can often be programmed to perform one or more of the above-mentioned
functions’ in essence replacing the employees. For example, computer systems are now
capable of recording a digital signature (or fingerprint), which signs a document with a
piece of data that cannot be forged. The principle of separating duties remains the same;
the only difference is that the computer performs the function rather than a human.
Example: Many gas stations are now equipped with pumps that allow customers to insert a
credit card to pay for their gas. In such cases, the custody of the “cash” and the
recording function are both performed by the computer. These machines not only
improve internal controls, they actually improve the process of serving the customer
by increasing convenience and eliminating lines to pay for the gas.
73
Chapter 4: Fraud Prevention: Opportunities
Example 1: Jerry Schneider noticed a trash can full of papers on his way home from a Los
Angeles-area high school. Rummaging through them, he discovered they contained
parts manuals and operating guides for Pacific Telephone and Telegraph’s computers.
Over time, his scavenging activities resulted in an impressive technical library. He
used the library to penetrate Pacific Telephone’s computer system, order equipment
for himself, and instruct the computer to not send him a bill for the goods ordered.
He sold the equipment to other companies and even sold some stolen equipment back
to Pacific Telephone. He was able to steal $1 million worth of electronic equipment
before a disgruntled employee turned him into the police.
Example 2: A janitor in Inglewood, Calif., was charged with stealing 34 blank checks while
cleaning the city Finance Office. He forged the names of city officials on the checks,
and cashed them in amounts ranging from $50,000 to $470,000.
Prevention Technique
Design and implement adequate safeguards over physical assets. The following procedures are
used to safeguard assets from such threats as theft, unauthorized use, and vandalism:
• Restrict access to physical locations, such as computer rooms and inventory storage.
• Restrict physical access to assets, thereby limiting the chances of loss. For example, cash
registers, safes, lockboxes, and safety-deposit boxes should be used to limit access to
cash, securities, blank checks, and other paper assets.
• Restrict access to computer files and information by using passwords and security codes.
• Protect records and documents. Access to vital records and documents can be restricted
by locking them in desks or file cabinets. Access to blank checks and documents should
be limited to authorized personnel.
• Discarded paper documents should be shredded.
• Employees should be informed of the consequences of using illegal copies of software,
and the company should institute controls to see that illegal copies are not in use.
• Closed-circuit televisions can be used to monitor areas where sensitive data or easily
stolen assets are handled.
74
Chapter 4: Fraud Prevention: Opportunities
Prevention Technique
Design and implement independent checks. Internal checks that evaluate the performance of
each transaction processing function are an important control. They should be “independent”
because they are more effective if performed by someone other than the person responsible for
the original operation. These independent checks include:
• Reconciliation of independently maintained records -- For example, checking accounts
should be reconciled to bank statements and subsidiary ledgers should be agreed to their
general-ledger control account balances.
• Comparison of actual quantities to recorded amounts -- For example, funds in a cash-
register drawer should be reconciled at the end of each shift with the cash-register tape.
• Batch totals -- When records are grouped for processing, batch totals are created. The
same control totals are generated by the computer during each subsequent processing
step. Discrepancies between the totals indicate that an error occurred during the previous
processing stage.
• Independent review -- Segregation of duties often results in two or more persons
processing a transaction. In such cases, the second person should review the work of the
first, performing such tasks as checking for proper authorization, reviewing supporting
documents, and checking the accuracy of critical data items.
Prevention Techniques
• Require accurate records be kept and checked carefully for irregularities.
• Require properly designed documents that are used appropriately. The proper design and
use of documents and records helps prevent fraud. Documents should:
o Be as simple as possible to minimize recording errors and facilitate efficient
record keeping, review, and verification;
o Contain a space for authorizations or the receiving person’s signature if they are
used to initiate a transaction or transfer assets to someone else; and
o Be sequentially pre-numbered so each can be accounted for. This reduces the
likelihood of fraudulent use by dishonest employees.
Record keeping should be well coordinated to facilitate tracing individual transactions through
the system. A good audit trail facilitates the prevention of fraud, the correction of errors, and
verification of system output.
75
Chapter 4: Fraud Prevention: Opportunities
Prevention Technique
Develop and implement controls for ensuring effective supervision of employees. Effective
supervision involves training and assisting employees, monitoring employee performance,
correcting errors that occur, and safeguarding assets by overseeing employees who have access
to them.
Many companies legitimately need many subsidiaries and divisions; the key is why there are so
many. The danger appears when the purpose of the complex structure is to not allow any one
party access to all the pieces or parts of any particular transaction. For example, when a
company uses different auditors for its various subsidiaries, none of them are able to see the
complete picture or trace transactions between subsidiaries from beginning to end.
Example: According to its bankruptcy trustee, the Bonneville Pacific Corporation’s collapse
was the most costly in the scandal-ridden alternative energy industry. The trustee
claims that the company grossly inflated its revenues, earnings, and assets. It also
failed to report contingent liabilities and related-party transactions. The result was
financial statements full of material misrepresentations and omissions. Losses were
estimated to be half a billion dollars.
The trustee further alleged that it is one of the most complex accounting frauds on record.
Apparently, Bonneville conducted business with a tangled web of subsidiaries and
partnerships. It conducted a series of baffling complex transactions to produce paper
profits and persuade people to invest money in Bonneville projects. Some of the
transactions were so complicated executives had to diagram them with a grease pencil
and drawing board at staff meetings. During one three-year period, Bonneville used
more than 300,000 cash and wire transactions to shift more that $1 billion between
itself and its subsidiaries and partnerships.
Prevention Technique
Companies should adopt a clear and appropriate organizational structure. Companies should
avoid unnecessarily complex organizational structures and auditors should be very skeptical of
them. Companies should:
• Have clear lines of authority and responsibility;
• Assign responsibility for specific tasks to departments and individuals; and
• Have a framework that facilitates planning, directing, and controlling its operations.
76
Chapter 4: Fraud Prevention: Opportunities
Example 1: A company with an understaffed accounting department fell three months behind
in its record keeping. An employee took advantage of the confusion to write himself
checks worth $450,000. He cashed the checks, left the country, and could never be
extradited.
Example 2: One real estate company that was going public purchased and resold several
nursing homes. The company recognized $2 million in current and deferred profits,
even though it only paid a $30,000 down payment when it bought the properties and
only received $25,000 in cash when it sold them. The transaction boosted sales from
$6.7 million to $22 million and converted its net income from a large loss to a gain.
Prevention Technique
A well-designed accounting system facilitates and promotes proper accounting practices.
The accounting system consists of the methods and records used to identify all valid transactions,
record them on a timely basis and at the proper monetary value, properly classify them, and
present them properly in the financial statements.
Companies should be constantly aware of the convenient opportunities that exist for people in
positions of trust to commit fraud. To keep the accounting system under control, companies
should require more frequent and thorough accountability from persons in positions of trust
through budgeting and performance reports. They should also create the expectation that all
financial decisions will be checked for accuracy and appropriateness.
The system should include, as appropriate, budgets, quotas, standard costs, and quality standards;
performance reports that compare actual performance with planned performance; and procedures
for investigating and correcting significant variances or unexpected results.
Prevention Techniques
• Ensure that no one person or small group has unchallenged power. No person or group
should have so much power that their decisions and actions cannot be challenged and
examined. Such people are usually in a position to impose their views on others,
77
Chapter 4: Fraud Prevention: Opportunities
including auditors and other outside, independent parties. Executives need to have the
authority to act decisively and deviate from normal procedures when the circumstances
warrant it, but they should still be questioned and required to explain their actions.
• Require periodic changes that eliminate domination.
• Set up compensating controls. An example would be effective oversight by the board of
directors or an audit committee.
Example 2: In another case, employees who realized management was overstating revenues
began billing the company for hours they did not work.
Prevention Techniques
A critical aspect of an organization’s control environment is a management philosophy and
operating style emphasizing honesty and adherence to controls. The more responsible
management’s philosophy and operating style, the more likely it is that employees will behave
responsibly in working to achieve the organization’s objectives.
If management shows little concern for internal control and ethical behavior, employees are not
likely to be as diligent or as effective in achieving specific control objectives. Management’s
philosophy and operating style can be assessed by answering questions such as:
• Does management take undue business risks to achieve its objectives, or does it assess
potential risks and rewards prior to acting?
• Does management attempt to manipulate performance measures such as net income so its
performance is seen in a more favorable light?
• Does management pressure employees to achieve results regardless of the methods
required, or do they demand ethical behavior? In other words, do they believe the ends
justify the means?
Management should display and communicate an appropriate attitude regarding the internal-
control and financial-reporting processes.
78
Chapter 4: Fraud Prevention: Opportunities
Example 1: Philip Crosby Associates (PCA), a consulting and training firm, undertook an
exhaustive search to select a financial director. The person hired was John C. Nelson,
an MBA and CPA with a glowing reference from his former employer. In reality,
however, both the CPA license and the reference were phony. John C. Nelson was
really Robert W. Liszewski, who had recently served an 18-month jail sentence for
embezzling $400,000 from a bank in Indiana. By the time PCA discovered this,
Liszewski had embezzled $960,000 using wire transfers to a dummy corporation
supported by forged signatures on contracts and authorization documents.
Great care should also be taken when an entity or its senior management has a known history of
securities-law violations or claims against them alleging fraud or securities-law violations.
People who have committed prior offenses are more likely to become repeat offenders.
Example 2: In the Salad-Oil Swindle, Tony De Angelis converted an old petroleum-tank farm
into salad-oil storage tanks and hired American Express Warehousing to
independently operate the warehouse. He placed 22 handpicked men at the
warehouse and they were able to fool American Express inspectors. They filled the
tanks with seawater and then placed a thin layer of oil on the top. The tanks were
connected by pipes, and the men piped oil back and forth between the tanks.
These and other tricks allowed De Angelis to claim 937 million pounds of oil when
only 100 million pounds actually existed. He claimed to own and store more oil than
existed in the whole country.
Auditing firms should be aware that when they accept a new client the probability of fraudulent
activity is much greater than with an existing client. When investigating potential clients, both
the principals and the company itself should be examined.
Example 3: One of the then-Big Six CPA firms was approached by a cattle operation. In
investigating the background of the president, they found that he had previously been
involved in a fraud. They declined the engagement. Another of the then-Big Six
79
Chapter 4: Fraud Prevention: Opportunities
firms accepted the engagement and within a few years they were involved in a
multimillion-dollar lawsuit because the company had perpetrated a fraud.
Prevention Technique
Conduct background checks. Check potential employees, audit clients, and major vendors. One
way to do that is to use an investigative agency. Investigative agencies can check out:
• Underworld or questionable connections;
• Financial history to determine credit history, heavy indebtedness, previous bankruptcies,
and whether the principals are living beyond their means;
• Employment history, including the number of years with the company, previous
employers, reputation among associates, and reasons for terminating previous affiliations;
• Undesirable conduct, such as gambling, drug abuse, etc.;
• Past criminal background;
• Personal reputation and educational background; and
• Conflicts of interest that may not allow the principals to act objectively.
Prevention Technique
Minimize related-party transactions. It is important to carefully control and scrutinize any
necessary related-party transactions.
Purchasing agents and salespeople who develop close associations with vendors and customers
are often able to commit a fraud. This is especially true where large amounts of money are at
stake. For example, vendors can easily afford to provide a purchasing agent with a kickback in
order to win a multimillion-dollar contract. A purchasing agent who is struggling to make ends
meet can easily be tempted by these kickbacks.
Procurement frauds are especially difficult to detect since the perpetrator does not have to alter
the company’s books to cover up the fraud.
Example 1: A purchasing agent responsible for acquiring janitorial supplies for a medium-
sized city was approached by a paper supplier with a deal. If he would allow them to
80
Chapter 4: Fraud Prevention: Opportunities
supply the municipality with lower-quality paper at the current price, they would give
him a kickback of half the excess profits.
After this had been going on for a few months, the paper supplier began raising the
prices and billing the municipality for five times what they shipped. They also
reduced the purchasing agent’s share of the kickback. When he complained, they
said: “What are you going to do? Tell your bosses that you have been accepting a
kickback?”
They were right; he was trapped. There was nothing he could do short of confessing
his part in the fraud.
Example 2: In the $300 million ESM fraud case, the partner in charge of the audit accepted
under-the-table payments from his client to not disclose the fraudulent financial
statements. The CPA had been the partner on the job for over eight years.
Prevention Techniques
• Control association with outsiders -- Frequent associations with suppliers, buyers, and
other business agents cannot be eliminated. However, businesses can require that accurate
records be kept of all transactions and check these records carefully for irregularities, such
as purchases made without the benefit of competitive bids. Any companies found to be
violating company policies relating to gratuities should be dropped as a supplier.
• Require explicit conflict-of-interest statements -- Companies should develop a manual that
outlines the company’s policies and procedures regarding the business associations of
purchasers, buyers, sales representatives, and others.
• Periodically communicate to vendors and customers the company’s policies regarding
gifts and gratuities -- When company policies are clearly communicated to customers and
vendors, they are able to determine whether a company’s purchasing agents and salespeople
are acting in accordance with company rules. Many frauds have been uncovered after such
letters were sent.
Example: After a fast-food restaurant discovered a kickback fraud, they sent letters to all their
suppliers explaining that it was against company policy for purchasing agents to
accept gratuities of any kind from vendors. As a result of the letter, two suppliers
stepped in and disclosed two additional frauds perpetrated by purchasing agents.
For example, when a special project is being hurried for completion, the normal controls are
often pushed aside, which results in the following:
• Signatures are obtained authorizing uncertain purchases;
• Reimbursements are made rapidly and with little documentation;
• Record keeping falls behind and cannot be reconstructed;
• Materials come and go rapidly and can easily be misplaced; and
81
Chapter 4: Fraud Prevention: Opportunities
Example: One Fortune 500 company was hit with three multimillion-dollar frauds in the same
year. All three took place when the company was trying to resolve a series of crises
and neglected to follow the standard control activities.
Prevention Technique
Continue to enforce internal control at all times.
General or Administrative
Prevention Technique
Maintain a competent and effective internal-audit department. A competent and effective
internal-audit staff that is conducting audits, independently testing and checking transactions,
and investigating irregularities is a significant deterrent to fraud. Even though most fraud is not
detected by internal auditors (they only catch about 20 percent of all frauds), they are more likely
to detect it than most other internal employees.
To perform their duties effectively and objectively, the internal-audit function must be
organizationally independent of accounting and operating functions. For example, the head of
internal auditing should report to the audit committee of the board of directors, the chief financial
officer, or the president, rather than to the controller.
Prevention Technique
Design and implement a good internal security system. A good internal security system should
be developed that focuses on:
• Traffic patterns in and out of the company;
• Procedures governing the storage and flow of materials;
• Internal and external lock-up procedures;
• Efficient and effective guard force; and
• Protection of sensitive information within the corporation.
Prevention Technique
Certain company assets are especially susceptible to misappropriation; take special care with them.
82
Chapter 4: Fraud Prevention: Opportunities
Since employees with situational pressures are more likely to misappropriate them, special care
should be taken with the following assets:
• Cash, especially where large amounts are on hand or processed;
• Inventory that is small and easy to move and that has a high value or is in high demand;
• Assets that are easily convertible to cash, such as bearer bonds, diamonds, or computer
chips; and
• Fixed assets that are small, marketable, or lack ownership identification.
Prevention Technique
Publish a policies and procedures manual containing specific conflict-of-interest statements. A
written policy and procedures manual is an important tool for assigning authority and responsibility
in many organizations. The manual should spell out management policy with respect to handling
specific transactions. In addition, it should document the systems and procedures employed to
process those transactions. It should include a detailed listing of the organization’s chart of
accounts, along with sample copies of forms and documents.
Example: At Ribeye Corporation, the payroll clerk never missed handling the payroll. Because
he was trusted, no one had the responsibility of reviewing his work.
Every two weeks the clerk forwarded payroll data for each employee to an outside
organization to prepare the checks. When the checks were returned, he ran them
through a check-signing machine and forwarded them to the restaurants for
distribution. However, the clerk created extra employees and added them to the
regular payroll data. It was easy for him to sign the checks using the machine,
endorse them, and deposit them into an account he controlled. Periodically, he would
terminate the fictitious employees and replace them with others at different
restaurants so that his exposure at any one restaurant was limited.
The clerk defrauded Ribeye out of almost $300,000. Many fellow employees found it
hard to believe that he was guilty of the fraud.
In today’s environment of downsizing and re-engineering, more responsibility and trust is being
placed in employees. As a result, they are more likely to operate in isolated or specialized
contexts that separate them from other individuals, thus making independent checks and
supervision difficult.
83
Chapter 4: Fraud Prevention: Opportunities
Prevention Techniques
• Persons in positions of trust should be subject to more frequent and thorough
accountability.
• Do not phase out checks and balances needed for proper controls.
Risk Factor: No Policy of Mandatory Vacations during Which Someone Else Performs
Duties
Many fraud schemes, such as lapping and kiting,1 require the ongoing attention of the
perpetrator. Therefore, employees should be required to take an annual vacation, during which
time their job functions are performed by others. If mandatory vacations were coupled with a
temporary rotation of duties, these types of ongoing fraud schemes would fall apart.
Example 1: When federal investigators raided an illegal gambling establishment, they found
that Roswell Steffen, who earned $11,000 dollars a year, was betting up to $30,000 a
day at the racetrack. Investigators at Union Dime Savings Bank discovered he had
embezzled and gambled away $1.5 million dollars of their money over a three-year
period.
After he was caught, he was asked how the fraud could have been prevented. He said
the bank could have coupled a two-week vacation period with several weeks of
rotation to another job function. That would have made his embezzlement, which
required his physical presence at the bank and his constant attention, almost
impossible to cover up.
When perpetrators take time off they run a great risk of getting caught.
Example 2: One perpetrator went on vacation and left his secretary very detailed instructions
about what transactions to enter for processing and when to enter them. She followed
the instructions to the letter, but the person processing the transactions made an error
and called the perpetrator for help in correcting the mistake. Since the perpetrator
was unavailable, and the secretary knew nothing about the transactions, the person
had to investigate the transaction to make the needed correction. The investigation
brought the fraud to light.
1
Lapping means that cash receipts are not recorded right away but are shifted between different accounts. This is done to
cover up a cash shortage. Kiting refers to writing a check against an account at one bank (which usually does not have
sufficient funds to cover it) and depositing or cashing the check through a different account at another bank to take
advantage of the time lapse before the check clears.
84
Chapter 4: Fraud Prevention: Opportunities
Prevention Techniques
• Set and enforce a policy that requires all employees to take an annual vacation.
• Have someone else perform the duties of the person on vacation. The ability to commit
and conceal a fraud is thwarted when another person is required to perform the perpetrator’s
job when they are on vacation. People who are not required to take a vacation are
sometimes caught when they become sick or are not able to be present at work.
Example: A $250,000 management fraud was uncovered when the vice president
suddenly died of a heart attack. The other executive involved in the fraud
was unable to juggle all of the paperwork needed to conceal the fraud.
Example: Frank Coccia, the top civilian official at a Defense Department procurement agency,
was responsible for purchasing $1.3 billion of military clothing each year. He had
been in charge of buying the same products for over 10 years and had won numerous
awards for outstanding service. Unfortunately, he began taking kickbacks from
companies that wanted to do business with the government. When he was arrested,
federal investigators seized over $400,000 in cash, money orders, gold coins, and
securities he had received as payoffs.
Prevention Technique
Rotate key employees periodically or transfer them to different functions. When employees are
rotated it often leads to actions that bring misconduct to light.
Example: When Grant Thornton’s audit-rotation policy required Richard Knight, the managing
partner of its Pittsburgh office, to be replaced as the audit partner of Chambers
Development Co., Knight left the firm to go with the client. The SEC claimed that, as
the audit partner, Knight knew of Chamber’s improper capitalization methods that led
to a $362 million restatement of earnings and class-action lawsuits. The SEC also
alleged that at Chambers, Knight “... became a leading actor in the company’s
misconduct by directing the preparation of financial statements reflecting increasingly
inflated financial results.” Knight neither denied nor confessed to the charges.
Prevention Technique
Develop a code of ethics. This should communicate corporate values and motivate employees to
live by it. Of particular importance is a formal company code of conduct addressing such matters
as standards of ethical behavior, acceptable business practices, regulatory requirements, and
conflicts of interest.
85
Chapter 4: Fraud Prevention: Opportunities
Prevention Technique
Design and implement an accounting system with adequate audit trails.
Prevention Technique
Train managers to adequately supervise subordinates and to pay attention to technical details.
Prevention Technique
Organize an audit committee consisting of independent board of directors’ members as
appropriate. They should be given charge of providing adequate management oversight.
Prevention Technique
Develop and implement a training program that provides employees with needed skills. This
should include fraud prevention and detection skills.
Prevention Technique
Design, implement, and enforce controls to ensure management’s correction of known reportable
conditions on a timely basis.
Exhibit 4-1 summarizes these risk factors and lists prevention techniques to make fraud less
likely.
Exhibit 4-1
86
Chapter 4: Fraud Prevention: Opportunities
87
Chapter 4: Fraud Prevention: Opportunities
Unclear policies and procedures Develop a policies and procedures manual containing specific
conflict-of-interest statements.
Placing too much trust in employees 1. Require more frequent and thorough accountability
from persons in positions of trust.
2. Do not reengineer out the checks and balances needed
for proper controls.
No policy of annual vacations during 1. Set and enforce a policy that requires all employees
which someone else performs duties to take an annual vacation.
2. Have someone else perform the duties of the person
on vacation.
Lengthy tenure in a key job Rotate key employees periodically or transfer them to
different functions to make fraud less convenient.
No effective means of communicating Develop a code of ethics that communicates corporate values
and supporting company values or and motivates employees to live by it.
ethics, such as a code of conduct.
No audit trails Design and implement an accounting system with adequate
audit trails.
Managerial carelessness or inattention Train managers to adequately supervise their subordinates
to technical details and to pay attention to technical details.
No effective oversight by board of Organize an audit committee consisting of independent board
directors of directors’ members as appropriate and give them charge of
providing adequate management oversight.
Inadequate training Develop and implement a training program that provides
employees with the skills they need, including fraud
prevention and detection skills.
Management’s failure to correct known Design, implement, and enforce controls to ensure that
reportable conditions on a timely basis management corrects known reportable conditions on a
timely basis.
88
Chapter 4: Review Questions
The review questions accompanying each chapter are designed to assist you in achieving the
learning objectives stated at the beginning of each chapter. The review section is not graded; do
not submit it in place of your final exam. While completing the review questions, it may be
helpful to study any unfamiliar terms in the glossary in addition to chapter course content. After
completing the review questions for each chapter, proceed to the review question answers and
rationales.
1. For which of the following risk factors would the use of a computer to perform the
custody and recording of cash be a proper prevention technique?
2. Restricting access to computer files and information by using passwords and security
codes would be a proper prevention technique for:
3. A proper prevention technique for the risk factor related to no independent checks on
performance would be:
4. For which of the following risk factors would requiring that accurate records be kept and
checked for irregularities be a proper prevention technique?
A. Inadequate supervision.
B. Inadequate safeguarding of assets.
C. No independent checks on performance.
D. Inadequate record keeping.
A. Inadequate supervision.
B. Lack of a security system.
89
Chapter 4: Review Questions
A. True.
B. False.
7. For which of the following risk factors would developing a code of ethics be a proper
prevention technique?
A. True.
B. False.
90
Chapter 4: Review Question Answers and Rationales
Review question answer choices are accompanied by unique, logical reasoning (rationales) as to
why an answer is correct or incorrect. Evaluative feedback to incorrect responses and
reinforcement feedback to correct responses are both provided.
1. For which of the following risk factors would the use of a computer to perform the
custody and recording of cash be a proper prevention technique?
2. Restricting access to computer files and information by using passwords and security
codes would be a proper prevention technique for:
3. A proper prevention technique for the risk factor related to no independent checks on
performance would be:
A. The use of a computer to perform the custody and recording of cash. This answer
is incorrect because the use of a computer to perform the custody and recording of
91
Chapter 4: Review Question Answers and Rationales
cash would be a proper prevention technique for the risk factor related to
insufficient separation of duties.
B. Restricting access to computer files and information by using passwords and
security codes. This answer is incorrect because restricting access to computer
files and information by using passwords and security codes would be a proper
prevention technique for the risk factor related to inadequate safeguarding of
assets.
C. A reconciliation of independently maintained records. This answer is correct
because a reconciliation of independently maintained records would be a
proper prevention technique for the risk factor related to no independent
checks on performance.
D. Requiring accurate records be kept and checked for irregularities. This answer is
incorrect because requiring accurate records be kept and checked for irregularities
would be a proper prevention technique for the risk factor related to inadequate
record keeping.
4. For which of the following risk factors would requiring that accurate records be kept and
checked for irregularities be a proper prevention technique?
92
Chapter 4: Review Question Answers and Rationales
7. For which of the following risk factors would developing a code of ethics be a proper
prevention technique?
93
Chapter 5: Fraud Detection
Fraud detection can be defined as all of the procedures or actions undertaken to ascertain that a
fraud has, in fact, been committed.
To detect fraud, a person must first understand where a company is vulnerable. These include
the points at which goods and cash flow in and out of the company, the use and storage of assets,
and the reporting of financial information.
Most crimes leave unmistakable evidence. For example, when a bank is robbed, there are often
witnesses and even videotapes of the theft. When a restaurant is robbed after hours, there are
broken cash registers and signs of forced entry.
In contrast, fraud is a crime that is hard to detect because it is almost never observed directly.
There are no videotapes, witnesses, smoking guns, or dead bodies. Instead, the perpetrator takes
great pains to conceal his tracks. Therefore, there often is no direct evidence of the fraud.
Those looking for fraud must learn to identify the indicators, or red flags, that are present in most
frauds. These clues, which are often referred to as fraud symptoms, can point to the existence of
fraud.
The fact that a person finds a fraud symptom in a company does not mean that fraud actually
exists. At that point, there are merely suspicions that a fraud might have taken place. Fraud
symptoms should be thoroughly investigated to determine whether they are present due to fraud
or due to other conditions.
Company Vulnerabilities
94
Chapter 5: Fraud Detection
employees who do not exist. As a result, the prime areas to look for fraud are purchasing,
shipping, cash disbursements, and payroll.
Critical areas to watch include revenues of all kinds, major expense categories, and assets such
as inventory and receivables. It is also important to be attuned to the possibility of an intentional
misapplication of accounting principles.
Use of Specialists
One important way to increase the probability of detecting fraud is to use specialists trained in
assessing company vulnerabilities and detecting fraud. Two types of specialists are discussed:
computer security officers and forensic accountants.
Computer-Security Officers
Most frauds are not detected by internal or external auditors. In one study, only 4.5 percent of
259 cases of fraud were uncovered by auditors. Normal system controls uncovered 45 percent,
32 percent were discovered by accident, and eight percent were found by computer-security
officers.
The study shows that having a computer-security officer who is responsible for fraud deterrence
and detection has a significant deterrent effect on computer frauds. The security officer can
monitor the system and disseminate information about improper system uses and their
consequences.
95
Chapter 5: Fraud Detection
Forensic Accountants
Forensic accountants specialize in fraud prevention, detection, investigation, and audit. Many
have degrees in accounting and have received specialized training with the FBI, the IRS, or other
law-enforcement agencies.
A professional designation has been created to recognize this field. The Association of Certified
Fraud Examiners in Austin, Texas, has developed a Certified Fraud Examiner (CFE) certification
program. To become a CFE, candidates must pass a two-day exam.
There are approximately 16,000 CFEs around the world. There are not very many CFE firms;
instead, most CFEs work for CPA or law firms and private and public companies.
Fraud Symptoms
Fraud is not easy to detect. The perpetrator usually takes great pains to cover up the fraud and to
make everything appear normal. However, the perpetrator is left exposed at three key points:
• When the item of value, such as cash, is stolen or some part of the financial statement is
materially misrepresented.
• When the perpetrator conceals actions so that the fraud scheme is not detected.
Concealment often requires documents or records to be created or altered, journal entries
to be made, or some other effort made to ensure that the books balance.
• When the perpetrator converts noncash assets into a form that can be used or spent.
As each of these three steps is undertaken, the perpetrator is vulnerable. For example, the
perpetrator could be spotted taking the physical asset or misstating the information. The created
or altered documents that hide the fraud can be spotted by someone else. The perpetrator could
be caught trying to cash stolen checks.
The vulnerability is not limited to the point in time when these three steps are taken. It extends
for some time, often almost indefinitely. For example, it could be days or weeks later that the
stolen item is missed. The auditor could note the altered document during the year-end audit.
When a company reconciles its checking account, it could spot a stolen check that was cashed.
Whenever a fraud takes place, there are a number of signs or manifestations that a fraud has
taken place. For example, there could be missing assets, fraudulent documents, and forged
checks. These signs or manifestations are referred to as fraud symptoms.
There are symptoms at each point of the fraud: the theft, the concealment, and the conversion.
Being aware of these symptoms and actively searching for them is one of the best ways to detect
fraud.
The fact that fraud symptoms are present is not a guarantee that fraud actually exists. However,
every time there is a fraud, one or more of these symptoms is present. Unfortunately, most
people are unaware of what constitutes a fraud symptom. As a result, the symptoms are rarely
recognized. Oftentimes, those familiar with fraud symptoms are so busy they do not notice them.
Many of those that are noticed are never properly investigated. As a result, many frauds are not
96
Chapter 5: Fraud Detection
detected or uncovered as soon as they could be. The result is an ever-increasing amount lost to
fraud.
When fraud symptoms are recognized and investigated, frauds often can be detected early. This
saves the company money. An active approach to searching for symptoms and investigating
fraud also serves as a deterrent to further fraud taking place.
Accounting Symptoms
All organizations have an accounting system that collects data about company transactions and
activities. In a typical company:
• Data is captured on paper documents or electronic forms;
• Data is summarized and entered into accounting files and ledgers in the form of
journal entries; and
• Data in these files and ledgers is periodically summarized and organized into
financial statements that are provided to the managers and owners of the business.
When a fraud is committed, some element of the documents, journal entries, or ledgers is often
altered, forged, manipulated, or destroyed to hide the fraud. This action usually produces what is
referred to as an accounting symptom.
This section of the chapter discusses some accounting symptoms. Time and space limitations do
not permit us to discuss all of the accounting symptoms, but some of the more prevalent are
discussed below.
97
Chapter 5: Fraud Detection
Example: At the end of almost every quarter, Lincoln Savings and Loan made
journal entries that artificially inflated its earnings. There were at least 13
of these transactions, and most of them resulted in Lincoln reporting a net
income instead of a net loss. In total, Lincoln overstated its income by
more than $100 million dollars.
98
Chapter 5: Fraud Detection
Ledger Problems
These include ledgers that do not balance or general-ledger control accounts that do not tie to
subsidiary ledger balances.
Some perpetrators are unable to effectively cover up their frauds. For example, in an inventory
fraud, the perpetrator may not be able to make an entry in company records to decrease the
inventory account. At some point, when inventory is counted, the inventory shortage is noted
when the balance on hand does not match the amount on the books. However, since this
symptom could also be the result of an employee error or spoilage, many companies do not
adequately investigate the shortages. They simply accept them as a cost of doing business. This
failure to investigate the shortages makes it possible for perpetrators to continue to perpetrate their
fraud, as long as they do not get too greedy.
Various approaches are available to value inventory, amortize or depreciate an asset, recognize
revenue, estimate warranty costs, or write off bad debts. When more than one accounting
principle can be chosen by a company, care should be exercised if the more liberal practice is
selected, unless there is a clear reason why that practice is more acceptable and appropriate.
Example: In 1980, Union Carbide was legitimately able to increase its net income
for the first quarter by $217 million. This increase was made possible by
three changes in its accounting policies:
o Changing from a conservative to a liberal depreciation policy;
o Changing the way the company accounted for investment tax
credits; and
o Capitalizing rather than expensing interest costs during
construction.
99
Chapter 5: Fraud Detection
The adverse opinion was prophetic; the $21 million of assets on the
balance sheet was grossly overstated.
AFCO declared bankruptcy and most of the $70 million dollars investors
sunk into AFCO limited partnerships was lost.
Example: Jiffy Lube was accused, in a civil lawsuit, with prematurely recognizing
franchise-fee revenue and thereby overstating its revenues and net income.
The company had to restate its financial results. As a result, its 1989 net
income of $7 million was turned into a loss of $79 million.
Example: The SEC investigated Savin Corporation and decided that from 1981 to
1984 they had improperly capitalized research and development costs. As
a result, assets and net worth for those years were, in total, overstated by
almost $100 million.
While some of these approaches to delaying costs may not be viewed as fraud, the fact that a
company chooses to use them may be indicative that there are more serious problems that do
constitute fraud.
Analytical Symptoms
According to SAS No. 56, analytical procedures are evaluations of plausible relationships among
financial and nonfinancial data.
100
Chapter 5: Fraud Detection
The auditor uses historical records, projections, and trends to develop expectations about the
company and its data. These expectations are then compared to the company's recorded amounts.
Unless there are legitimate reasons, any significant deviation from the expectations signals an
area for further investigation.
Financial statements can be compared to those of prior periods. The actual dollar amounts can be
compared as well as the ratios calculated from the statements. Company ratios and financial data
should also be compared to those of companies in the same industry.
Financial-Statement Review
We discuss two approaches to reviewing financial statements: vertical and horizontal analysis
and cash-flow statement analysis.
Exhibit 5-1 shows a vertical analysis of a balance sheet and an income statement for
an example company (note that differences are due to rounding).
• Horizontal analysis -- In a horizontal analysis, account balances for two separate years
are analyzed by comparing the percentage changes between the years. The total dollar
change is also shown.
Exhibit 5-2 shows the horizontal analysis for the example company (note that differences
are due to rounding).
• Vertical/horizontal analysis -- What does vertical and horizontal analysis show us? Look
at the vertical analysis of the income statement in Exhibit 5-1.
o Note that the gross margin percentage for Year 1 was 50 percent and for Year 2 it
was 60 percent.
101
Chapter 5: Fraud Detection
Is it logical that sales could increase by 25 percent without the cost of goods sold increasing?
There may be an explanation for this, but in this case, the increase is a result of management
intentionally overstating inventory by $100,000 to cause net income to rise.
To illustrate this, consider the example below. Assume that the correct value of ending
inventory is $400,000.
Example:
Correct Fraudulent
+ Sales $1,000,0 $1,000,00
00 0
+ Beginning 300,00 300,00
inventory 0 0
+ Purchases 600,00 600,00
0 0
- Ending - -
inventory 400,00 500,00
0 0
- Cost of goods = Cost of goods 500,000 500,00 400,000 400,00
sold sold 0 0
= Gross margin $500,000 $600,000
By overstating ending inventory by $100,000, management was able to increase its gross margin
by that same amount. And of course, net income before taxes went up by the same amount.
There is another fraud in these statements that the vertical and horizontal analysis can help
discover.
Note in Exhibit 5-1 that cash went from 20 percent of assets in Year 1 to 14 percent in Year 2
and that receivables went from five percent to nine percent. Note in Exhibit 5-2 that cash
declined by 25 percent, while receivables went up by 100 percent. That is a huge percentage rise
in accounts receivable. In this case, an investigation showed that an employee stole $50,000 in
cash and concealed the fraud by inflating accounts receivable.
102
Chapter 5: Fraud Detection
Exhibit 5-1
Example Company
Vertical Analysis of Balance Sheet
Year 2 Year 1
ASSETS
Example Company
Vertical Analysis of Income Statement
Year 2 Year 1
Expenses:
Administrative 75,000 8% 65,000 8%
Selling 125,000 13% 105,000 13%
Income before taxes $ 400,000 40% $ 230,000 29%
103
Chapter 5: Fraud Detection
Exhibit 5-2
Example Company
Horizontal Analysis of Balance Sheet
Example Company
Horizontal Analysis of Income Statement
Expenses:
Administrative 75,000 65,000 10,000 15%
Selling 125,000 105,000 20,000 19%
104
Chapter 5: Fraud Detection
Exhibit 5-3 shows a simple cash-flow statement for Cougar Creations. Assume that from the
other statements you know that sales are rising significantly. The company had held the land it
sold for a number of years, and the sale amount was rather large.
Exhibit 5-3
Cougar Creations
Statement of Cash Flows
An analysis of this statement would lead a fraud investigator to ask and investigate the following
types of questions:
• Did the company's cash balance actually increase by $190,000? If not, what happened to
it? Was it stolen?
• If sales are up significantly, why did receivables increase by only $10,000? Could the
company be booking bogus sales?
• If sales are up significantly, why did inventory decrease by $45,000? Again, could the
company be booking bogus sales?
• If inventory decreased by $45,000, why did the accounts payable balance rise by
$30,000? Is a theft of cash being hidden by delaying payment?
• If the land was owned for a number of years and sold for a rather large amount, why was
it sold for only $15,000? Was the land sold at fair market value or was the sales price
artificially small because it was sold to a related party?
• Why was the equipment purchased? Was it purchased at a fair market value, or from a
related party at an inflated price?
• If cash increased by $190,000, why borrow $20,000?
105
Chapter 5: Fraud Detection
It is important to realize that financial-statement analysis merely suggests areas where fraud
MIGHT have occurred; it does not prove that a fraud took place.
Since most accountants are familiar with ratio and trend analysis, we forgo an explanation of
those items in favor of other items less readily understood.
Unusual Relationships
Many analytical fraud symptoms are conditions or data relationships that are unusual,
unexpected, or unrealistic. Many are found using the ratios shown in Exhibit 5-4 below.
Exhibit 5-4
Profitability Ratios
Liquidity Ratios
Solvency Ratios
Activity Ratios
106
Chapter 5: Fraud Detection
Other Ratios
However, there are a number of other analyses that can be performed to detect fraud. Many
require a fraud investigator to compare financial-statement data to nonfinancial data and
determine if the comparison makes sense. Many of the other analyses also involve being
creative, challenging explanations, and actively looking for relationships between data items that
do not make sense.
107
Chapter 5: Fraud Detection
A number of unusual conditions or relationships that are seen frequently are presented below in the
form of fraud symptoms.
• A company whose ratios and operating performance are significantly better than others in
its industry -- Since companies in the same industry face the same competitive and
economic challenges, it is likely that all companies in the same industry will have
somewhat similar ratios. Therefore, company ratios and trend analyses should be
compared to those of other companies in the same industry. These statistics are available
from organizations such as Moody's and Dun and Bradstreet. Any notable divergences
should be investigated.
Example: In the early 1970s, Equity Funding stock was a favorite of stock market
investors. A main reason for its popularity was that it was showing record
profits at a time when other insurance companies were showing losses.
Only later was it discovered that their profits were fabricated. Equity
Funding generated more than $2 billion worth of fictitious insurance
policies that it sold to reinsurance companies.
108
Chapter 5: Fraud Detection
Example: Donald Sheelen, the CEO of Regina Vacuum, owned 40 percent of the
stock and was vitally interested in having the stock rise. To improve
earnings, Regina booked bogus sales, prematurely recognized revenues,
and did not book millions of dollars of defective merchandise that was
returned because plastic parts were melting. The defective merchandise
also resulted in a significant increase in uncollectible and overdue
receivables.
Example: Sales at an automobile-repair business went up each year, but the amount
of cash sales and cash balances steadily declined. The owner finally
discovered that his accountant was stealing increasing amounts of cash by
pocketing the money from cash sales. By the time the fraud was
discovered, he was stealing over half of all cash receipts.
109
Chapter 5: Fraud Detection
Example: The SEC accused Datapoint Corporation, a maker of local area network
systems, with boosting revenues and net income by:
o Shipping products ahead of scheduled delivery dates;
o Sending partial shipments; and
o Knowingly shipping orders that customers had canceled.
The SEC investigation and disclosure played a large part in the stock
falling from almost $120 a share to $11 a share.
Example: An auditor for a large motel chain noticed that the cost of laundry and
toiletries at one of its units was rising significantly at the same time
revenues remained flat. An investigation showed that room occupancy
was up (requiring more laundry and toiletries), but the manager was
pocketing many of the room rentals paid for in cash.
110
Chapter 5: Fraud Detection
• Inadequate or overly generous reserves -- One way to manipulate net income is not to set
up adequate reserves for actual or estimated losses. For example, a property and casualty
company could grossly underestimate its losses due to hurricane damage.
Example: First Executive Life Insurance Company suffered extensive losses in both
the junk-bond market and the real estate market. In an effort to disguise
the true financial condition of the company, the losses were not adequately
written down.
In April 1991, regulators seized First Executive and its affiliates. In May,
First Executive filed for Chapter 11 bankruptcy; it was one of the biggest
insurance failures in American history.
Though much less common, companies can also set up overly generous reserves.
The most common reason for doing this is to "smooth" earnings. In other words,
companies can "store" earnings in a reserve account so that they can hedge against
a future downturn. Income smoothing is often symptomatic of more serious
problems that might result in fraudulent activity.
Example: One alert auditor noticed there was no supporting documentation for a
payment to the Oldsmobile dealer for bodywork on the president's
Cadillac. Curious about why they would send the Cadillac to the Olds
dealer for bodywork, he investigated further. He found that no claims had
been sent to the organization’s insurance company. He also found that a
payment of exactly the same amount was made every month, and none of
them had any supporting documentation. He was unable to find any
record of a fixed-fee maintenance agreement. When he called the Olds
dealer, he found that the payments were being applied to a woman's car
loan. Further investigation revealed that the woman was the business
manager's girlfriend, and he was paying off her car loan.
• An increase in net income without a corresponding increase in cash flow from operations.
• Deteriorating quality of earnings.
• A significant increase in the number of voids, credits, reconciling items, or late charges.
• Significant increases, decreases, or adjustments to "at-risk" accounts such as payables,
receivables, or inventory.
• “Missing” employees at unscheduled payroll distributions.
• A significant increase in the number of dormant accounts activated.
• A significant percentage rise in expense reimbursement amounts.
• Persistent cash shortages in any cash account or cash register.
• Unexplained changes in financial-statement balances.
Behavior Symptoms
111
Chapter 5: Fraud Detection
Altered Behavior
How would you feel if you began committing a fraud? Would you feel fear? Guilt? Anxiety?
How do you think these feelings would affect you? Behavioral psychologists and experienced
fraud investigators say that most fraud perpetrators, especially if they are first-time offenders,
alter their behavior in recognizable ways.
Example 1: Eddie Antar, who orchestrated the Crazy Eddie fraud, became increasingly
overbearing as the fraud progressed. Finally, unable to live with his fear
that he would be caught and his obsession with what would happen to him
if he were caught, he disappeared. He was later extradited from Israel to
face fraud charges.
Example 2: Lester B. Nay, the president of First Securities of Chicago, left a suicide
note explaining how he had tricked investors into placing money in
nonexistent, high-yielding escrow accounts. He defrauded them out of
millions of dollars.
Management Pressures
Other behavior symptoms (listed below) do not involve change, but have more to do with
management inquisitiveness, pressures, or turnover.
• Management is overly inquisitive about the effect of alternative accounting treatments on
earnings per share.
• Management has excessive interest in maintaining or increasing the company's stock
price or earnings trend through the use of unusually aggressive accounting practices.
• There could be client pressure to complete the engagement in an unusually short amount
of time.
112
Chapter 5: Fraud Detection
Example: Equity Funding had three different controllers in one year. The first one
quit because of the irregularities. When his replacement discovered them,
he refused to sign SEC documents concerning the financial condition of
the company. The president offered the second controller a promotion in
exchange for his cooperation. The promotion was declined, and the
second controller left the company. A third controller was hired and he
was eventually implicated in the fraud.
It is not those who have typically been viewed as responsible for fraud detection, because
internal and external auditors move around and associate with company employees on an
infrequent basis.
It is not the board of directors or the audit committee, since they too are not at the company on a
daily basis. Even top managers (unless they are the perpetrators) are not in a position to detect
the fraud since they are often isolated from other employees.
So, who is in the best position to detect fraud? It is the perpetrators' co-workers and immediate
supervisors, the ones who interact with them on a daily basis.
However, co-workers and immediate supervisors who witness or are aware of fraudulent
behavior are often torn between two conflicting feelings. On the one hand, they feel an
obligation to protect company assets and turn in fraud perpetrators. However, they are often
uncomfortable in the "whistle-blower" role and find it easier to remain silent. There are several
reasons why they are reluctant to take action.
• They are uncertain that a fraud has actually taken place; they do not want to falsely
accuse anyone.
• They do not want to get involved or to make trouble for someone else.
• They have fear of the consequences. They fear reprisals, such as getting fired, damage to
their career, and being ostracized by fellow workers.
• They have been taught not to be a squealer.
• They are uncertain about how to go about making the information available or who to
tell.
113
Chapter 5: Fraud Detection
As a result, most people who are aware of a fraud will not make a formal complaint to someone
in a position of authority. However, they may begin to complain about the person or make hints
or otherwise give off indications that they know something is not right.
Unfortunately, most co-workers and mangers are not trained to pick up on these symptoms or to
separate them from the normal complaints and office gossip. As a result, the company misses
out on one of the best sources of fraud information: co-workers who have seen or know of
fraudulent actions.
Hotlines
If employees are able to report someone anonymously, they are often able to overcome the
above-mentioned reluctances. Therefore, an important way to uncover fraud is to set up an
anonymous fraud hotline.
Hotlines have been very effective. Researchers at Brigham Young University studied 212 frauds
and found that 33 percent of them were uncovered by anonymous tips.
The insurance industry set up a hotline so people could report dishonest practices in an attempt to
control an estimated $17 billion a year in fraudulent claims. In the first month, they received in
excess of 2,250 calls. Between 10 percent and 15 percent of the calls resulted in investigative
action.
The downside of hotlines is that many of the calls are not worthy of investigation. Some
informants are motivated by personal problems, anger, jealousy, or a desire for revenge. Some
are vague reports of wrongdoing, and others have no merit. Therefore, it is essential that no one
reported on a hotline is presumed guilty until he or she is proven so or he or she confesses.
A potential problem with a hotline is that the people who operate the hotline may report to
people who are involved in top-management fraud. This can be overcome by using a fraud
hotline set up by a trade organization or commercial company. Reports of management fraud
can be passed by this outside company directly to the board of directors.
Whistle-Blowing
There are many instances of fraud uncovered due to someone in the organization blowing the
whistle.
Example 1: One high official at a food-processing company acted as a mole for the
FBI and was instrumental in bringing price-fixing charges against the
company.
114
Chapter 5: Fraud Detection
Example 3: Department of Defense auditors received three anonymous tips that a major
defense contractor was shifting cost overruns on fixed-fee contracts to cost-
plus contracts. When they investigated, they found that almost $40 million
in expenses had been reallocated. The officials responsible for the fraud
were jailed, and the company was fined $100 million.
Outsider/Related-Party Symptoms
Sometimes the relationships that a company has with outsiders and related parties can provide us
with the clues we need to detect a fraud. A few of the more important related-party and outsider
symptoms are discussed below.
• Frequent changes of auditors or lawyers -- The risk of a fraud is higher at companies that
change auditors or legal counsels frequently. A CPA or law firm that suspects or
concludes that its client is not trustworthy or is involved in illegal activities would
probably resign.
A company that suspects its auditors are getting close to detecting an illegal act will
likely fire its auditors because a new auditor, without any suspicions, is less likely to
detect a fraud. Likewise, a company faced with a request to provide damaging
information to existing legal counsel will likely fire its lawyers because a new law firm,
without any suspicions, is less likely to realize there is anything wrong.
115
Chapter 5: Fraud Detection
Accountants who audit firms with frequent legal and auditor changes should be especially
careful to investigate the reasons for the changes and to discuss with management and
predecessor auditors and lawyers, as appropriate, the reasons for the changes.
Example: Lincoln Savings and Loan had three different auditors in four years.
Arthur Andersen and Co. was the auditor in 1985, and Ernst and Young
was the auditor in 1986 and 1987. Deloitte and Touche was engaged to do
the 1988 audit, but never issued an audit opinion on their statements.
116
Chapter 5: Fraud Detection
When a company wants to book bogus sales, it usually finds it easier to confine these
sales to one or a few customers. Doing so makes it easier to separate the legitimate from
the bogus and to steer auditors and investigators away from the bogus accounts.
• Significant related-party transactions not in the ordinary course of business.
• Intercompany transactions with related entities that are not audited or are audited by
another firm.
Internal-Control Symptoms
Chapter 4 discussed in depth the internal-control deficiencies that allow fraud to take place. The
absence of any one of these controls is a fraud symptom. The importance of these controls is
illustrated by several studies showing that one of the most effective fraud detectors is effective
internal control.
Internal-control symptoms could be much more effective in detecting fraud than they currently
are. However, management and auditors who detect internal-control weaknesses do not view the
weaknesses as fraud symptoms.
When an internal-control weakness is found, the typical reaction is either concern (“We need to
fix that immediately") or a lack of concern ("We need to fix that someday"). The first reaction is
certainly a proper one and the better of the two. However, it does not go far enough. The
company must also recognize that the weakness is a fraud symptom that must be thoroughly
investigated to determine if a loss has occurred.
Periodically assessing internal control and investigating all weaknesses with the intent of looking
for fraud is one of the most effective fraud-detection methods available.
117
Chapter 5: Fraud Detection
During this evaluation, it is important not to just look at the internal controls
that are in place, but to evaluate whether they are enforced. Having an
internal control in place, yet not enforcing it, is like not having the control at
all.
Example 2: The bookkeeper at a small bank embezzled over $3 million dollars from
her employer. She wrote personal checks on her account at the bank and
intercepted them when they were returned by the Federal Reserve. She
had accounts at other banks and wrote checks from those accounts and
deposited them into her account. These were intercepted before they were
sent to the Federal Reserve for collection. The net result was that she had
an "unlimited" checking account.
Because of the fraud, the amount in the master demand deposit did not
match the total of the individual demand deposit balances. To keep the
auditors from discovering the fraud, she parked the difference at the
Federal Reserve on the days the auditors checked the books. She did this
by sending the Federal Reserve enough previously used cashier’s checks
to cover the amount of her fraud. The Federal Reserve gave the bank
credit for the amount of the bank's outgoing cash letter. The next day,
when the Federal Reserve discovered that the cashier’s checks were the
bank's own checks, they reversed the credit they had given the bank the
previous day. The net result: the books balanced only on the day the
auditors checked the books.
The fraud was uncovered when a check was rejected by the Federal
Reserve sorter because it had been used so many times it could not be
read.
The bank had the controls needed to detect the fraud. Unfortunately, they
were not enforced nor were the following noted weaknesses investigated:
o Although the accounts balanced at the end of the month, they were
out of balance the rest of the time. The bank received daily reports
that showed the out-of-balance condition, but they were never
investigated.
o Individual accounting records were altered.
o The bookkeeper said that her workload was too heavy for her to
take the bank's mandatory two consecutive weeks' vacation. As a
result, management gave her permission to not follow the policy.
o The bank required two signatures on all general-ledger tickets.
The bookkeeper asked the other signatories to presign tickets to
avoid the hassle of getting signatures when people were busy with
other tasks.
118
Chapter 5: Fraud Detection
Lifestyle Symptoms
Almost all perpetrators spend their ill-begotten gains as quickly as they get them to upgrade their
lifestyle. Perpetrators seem to need instant gratification; perhaps that is what leads them to
commit a fraud in the first place.
It is very rare to hear of a perpetrator that "saves" the money taken. One particular fraud expert
reports that he has investigated or studied hundreds of frauds and can only remember two where
the perpetrator could be said to be saving, rather than spending, the money taken. One was a
man who bought gold bullion and stored it in his basement. The other was a woman who used
the money to set up trust funds for her grandchildren.
Their spending eventually leads to some form of conspicuous consumption. For example, they
spend the money on:
• Fancy cars;
• Luxurious homes;
• Vacation homes;
• Expensive vacations;
• Expensive clothes, jewelry, and restaurant meals;
• Presents for family and friends; and
• Gambling, drugs, alcohol, and sexual relationships.
If employers were more observant, they could easily pick up on these symptoms. Many
perpetrators like to show off their trappings of success and few seek to hide their newfound
wealth. After all, who wants to buy a brand new expensive sports car and let it sit at home in the
garage?
Any evidence of company employees living beyond their means should be thoroughly
investigated. Chapter 6 discusses some of the methods that can be used to conduct this
investigation. As illustrated in the following example, in many cases of conspicuous
consumption, the evidence will lead to proof that a fraud is taking place.
Example: One Saturday night, an observant bank auditor in London noticed a vice
president of the bank's leasing subsidiary driving a restored Rolls Royce
Silver Cloud. Wondering how he could afford a car worth several
hundred thousand dollars, he began an investigation. He found that the
leasing officer had negotiated eight sale-and-leaseback agreements with
shipping firms for a total of $244 million. The treasurer of each of the
shipping companies was paid a legal five-percent commission, but the
leasing officer had taken 40 percent of the commission as a kickback. In
all, the leasing officer received $4.88 million. The man who appraised all
of the equipment took a $25,000 bribe on each lease to inflate the price of
the equipment by 20 to 25 percent. The bank absorbed a substantial loss.
119
Chapter 5: Fraud Detection
Environmental Symptoms
Why do some organizations seem to be plagued with more fraud than others? Could something
the company says or does affect the amount of fraud that takes place? Could the example and
behavior of management affect how other employees behave?
Studies have found that the honesty of some employees is significantly affected by the cultural
standards of management and their co-workers. That means, for example, that companies that
teach, emphasize, and reward honesty, as well as clearly label and define honest and dishonest
actions, are likely to experience less fraud.
Conversely, management and companies that do not believe in or follow a high ethical standard
often face more than their share of fraud. The following are environmental symptoms that might
indicate the presence of fraud.
• Confusion about honesty and ethics -- As described above, management and employees
must believe in and live a high ethical standard.
• Past occurrences of fraud.
• Domineering and overbearing management -- Individuals with sufficient power to direct
and control an organization without being questioned can impose their views on others.
They can also use their position to intimidate other employees into remaining silent, even
when the other employees know that a fraud is taking place.
Example: The head of a merchant bank in England always bought three tickets, from
three different sources, for every business trip he took. He used one ticket
and traded the other two for vouchers that could be used to buy tickets
anytime within the next year. He used the vouchers to fly himself and his
wife to their estate in Ireland. He approved one set of tickets before
leaving. Upon his return, he submitted the other two for reimbursement.
The secretary knew what was going on, but was afraid to disclose
anything for fear of losing her job.
Six months later, the consultant saw the same operator with another client.
He checked the same computer application where he had found the
previous fraud. Sure enough, the operator had committed an $85,000
120
Chapter 5: Fraud Detection
• The company does not conduct background checks on all potential employees -- A
person's past behavior can often give clues to his future behavior. Background checks
can help uncover employees with criminal records or past troubles with regulatory or
governmental agencies. The importance of using background checks to uncover these
types of problems is discussed in Chapter 4.
• The company frequently operates in a crisis or rush mode -- During times of crisis or in
an effort to complete a rush job, the normal controls are often pushed aside. This makes
it easier to not only commit, but to conceal a fraud.
• Management is carelessly inattentive to details and fails to correct errors or problems on a
timely basis.
• Management routinely disregards company guidelines and controls -- Management that
ignores company controls and guidelines sets a bad example for employees. The
employees also start to resent the fact that there are two sets of rules, one for them and
another for management.
• Compensation plans that are contingent upon achieving unduly aggressive sales,
profitability, other goals -- This may motivate a person to overstate company
performance in order to increase compensation.
• Unrealistic performance standards -- These can lead to desperation and anger, resulting in
dishonesty or to "get even" attitudes. In essence, the company may be motivating
employees to fraudulent behavior rather than improved performance. It may be forcing
them to choose between failing through no fault of their own and cheating.
• Low employee morale or loyalty -- Fraud is more likely to occur in situations where
morale is low, or where there are significant feelings of ill will, resentment, anger, or
alienation. Employees may have these feelings because they:
o Have substandard working conditions;
o Fear they may lose their jobs;
o Severely resent someone in the company;
o Are underpaid and "deserving" of more money;
o Feel their contributions are not appreciated or recognized; and
o Feel the company is taking advantage of them.
• The company is in poor financial condition.
• Absence of employee support and assistance programs.
Lack of a fraud policy -- This includes policies to prevent, detect, investigate, and handle
fraud.
121
Chapter 5: Review Questions
The review questions accompanying each chapter are designed to assist you in achieving the
learning objectives stated at the beginning of each chapter. The review section is not graded; do
not submit it in place of your final exam. While completing the review questions, it may be
helpful to study any unfamiliar terms in the glossary in addition to chapter course content. After
completing the review questions for each chapter, proceed to the review question answers and
rationales.
1. The areas of purchasing, receiving, cash receipts, and accounts receivable are the prime
areas to look for fraud in:
2. With regard to fraudulent financial reporting, subsequent year net income can be inflated
by:
3. True or false: The fact that fraud symptoms are present is a guarantee that fraud exists.
A. True.
B. False.
4. The presence of alleged, forged, or unusual documents may indicate that a fraud has
occurred and is considered a(n) _______ symptom.
A. Analytical.
B. Behavior.
C. Accounting.
D. Organizational structure.
122
Chapter 5: Review Questions
6. True or false: Vertical and horizontal analyses are means of analyzing individual
financial statement account balances by converting financial statement numbers to
percentages so that relationships between data are easier to understand.
A. True.
B. False.
7. An unusual or unexpected gross profit margin may indicate that a fraud has occurred and
is considered:
A. An analytical symptom.
B. A lifestyle symptom.
C. An accounting symptom.
D. An environmental symptom.
10. True or false: Co-workers and immediate supervisors who witness or are aware of
fraudulent behavior often feel uncomfortable in the whistle-blower role and find it easier
to remain silent.
A. True.
B. False.
A. A lifestyle symptom.
B. An outsider/related party symptom.
C. An internal control symptom.
123
Chapter 5: Review Questions
12. Which of the following symptoms would a strained relationship between management
and its current or predecessor auditors be an example of?
A. A lifestyle symptom.
B. An outsider/related party symptom.
C. An internal control symptom.
D. An organizational structure symptom.
124
Chapter 5: Review Question Answers and Rationales
Review question answer choices are accompanied by unique, logical reasoning (rationales) as to
why an answer is correct or incorrect. Evaluative feedback to incorrect responses and
reinforcement feedback to correct responses are both provided.
1. The areas of purchasing, receiving, cash receipts, and accounts receivable are the prime
areas to look for fraud in:
A. Receipt of goods or cash. This answer is correct because the prime areas to
look for fraud in receipt of goods or cash are purchasing, receiving, cash
receipts, and accounts receivable.
B. Purchasing, disbursement of cash, and shipment of goods. This answer is
incorrect because the prime areas to look for fraud in purchasing, disbursement of
cash, and shipment of goods are purchasing, shipping, cash disbursements, and
payroll.
C. Misappropriation of company assets. This answer is incorrect because the prime
areas to look for fraud in misappropriation of company assets are inventory,
supplies, equipment, machinery, and fixed assets.
D. Fraudulent reporting of company results. This answer is incorrect because the
prime areas to look for fraudulent reporting of company results are revenues of all
kinds, major expense categories, and assets such as inventory and receivables.
2. With regard to fraudulent financial reporting, subsequent year net income can be inflated
by:
3. True or false: The fact that fraud symptoms are present is a guarantee that fraud actually
exists.
A. True. This answer is incorrect because fraud symptoms may indicate the
existence of fraud but they do not guarantee that fraud exists.
B. False. This answer is correct because fraud symptoms may indicate the
existence of fraud but they do not guarantee that fraud exists. However,
every time there is fraud, one or more of the symptoms are present.
125
Chapter 5: Review Question Answers and Rationales
4. The presence of alleged, forged, or unusual documents may indicate that a fraud has
occurred and is considered a(n) _______ symptom.
6. True or false: Vertical and horizontal analyses are means of analyzing individual
financial statement account balances by converting financial statement numbers to
percentages so that relationships between data are easier to understand.
A. True. This answer is correct because vertical and horizontal analyses are
means of analyzing individual financial-statement account balances by
converting financial-statement numbers to percentages so that relationships
between data are easier to understand.
B. False. This answer is incorrect because vertical and horizontal analyses are
means of analyzing individual financial-statement account balances by converting
financial-statement numbers to percentages so that relationships between data are
easier to understand.
126
Chapter 5: Review Question Answers and Rationales
7. An unusual or unexpected gross profit margin may indicate that a fraud has occurred and
is considered:
127
Chapter 5: Review Question Answers and Rationales
10. True or false: Co-workers and immediate supervisors who witness or are aware of
fraudulent behavior often feel uncomfortable in the “whistle-blower” role and find it
easier to remain silent.
12. Which of the following symptoms would a strained relationship between management
and its current or predecessor auditors be an example of?
128
Chapter 5: Review Question Answers and Rationales
A. Persistent inventory shortages for portable and easily sold items. This answer is
incorrect because persistent inventory shortages for portable and easily sold items
are an analytical symptom.
B. A company that frequently operates in crisis or rush mode. This answer is
correct because frequently operating in crisis or rush mode is considered an
environmental symptom.
C. An increase in variable costs without a corresponding increase in revenue. This
answer is incorrect because an increase in variable costs without a corresponding
increase in revenue is an analytical symptom.
D. The lack of an audit committee composed of outside members of the board of
directors. This answer is incorrect because the lack of an audit committee
composed of outside members of the board of directors is an organizational
structure symptom.
129
Chapter 6: Fraud Investigation and Audit
Fraud is like an iceberg. We see only a small part of what has actually taken place. Just as one
must "go under water" to determine the actual size of an iceberg, so a fraud investigator must
probe deeply to discover the true extent of fraud.
The purpose of a fraud investigation is to determine if, in fact, a fraud occurred and, if it did, the
extent of the fraud. To make this determination, there are a number of different types of evidence
that can be gathered and analyzed.
Fraud investigators have classified the different types of fraud evidence into four major
categories: documentary, people, personal observation, and physical evidence. Each of these
four types of evidence is discussed in this chapter. Before the evidence types are discussed,
however, this chapter discusses the fraud investigation process and fraud examination theory.
The Fraud Investigation Process
As mentioned in Chapter 5, companies that want to detect fraud should be on the lookout for
fraud symptoms. When symptoms are noted, they should be investigated. The purpose of the
investigation is to gather sufficient evidence to determine whether or not a fraud actually
occurred.
In investigating fraud, it is important to remember that the mere occurrence of one or more fraud
symptoms does not indicate that a fraud has, in fact, occurred. The symptom often has a very
logical explanation other than fraud.
Great care also needs to be exercised in determining who is a suspect and who should be
investigated. It can be very traumatic to be investigated. Once people realize who is the target
of an investigation, the rumors and innuendos start flying. Questions are asked about the person,
and suspicions are raised in the minds of family members, business associates, and community
members. Some suspects who are confronted with allegations or investigation findings are
unable to handle it and have suffered heart attacks, emotional breakdowns, or they commit
suicide.
If a fraud investigation is handled badly, one or more of the following undesirable things might
happen.
• Employee morale can be damaged significantly.
130
Chapter 6: Fraud Investigation and Audit
• Innocent people may receive irreparable harm to their reputations. This may result in a
lawsuit.
• The perpetrator(s) are not caught and are thus free to repeat the fraud at the company or
elsewhere.
• The company is unable to prevent similar incidents or recover damages because they never
find out how the fraud was committed and concealed.
Before beginning a formal investigation, management approval must be obtained because a fraud
investigation can be disruptive and quite expensive.
One way to organize fraud information so that all of the above-mentioned fraud elements are
considered is to use a vulnerability chart. Exhibit 6-1 shows a vulnerability chart for three
separate frauds: a theft of a customer deposit, an inventory theft, and an overcharge on goods.
For each of these three frauds it shows:
131
Chapter 6: Fraud Investigation and Audit
• Missing assets;
• Individuals who could have taken the assets;
• Ways the theft could have occurred;
• Methods the perpetrator could have used to conceal the fraud;
• Methods the perpetrator could have used to convert the assets to cash or
personal use;
• Observed symptoms;
• Possible motivating pressures;
• Probable rationalizations used by the perpetrator; and
• Internal controls that were probably compromised in committing the fraud.
132
Chapter 6: Fraud Investigation and Audit
Exhibit 6-1
Vulnerability Chart
Source: Fraud: Bringing Light to the Dark Side of Business, by W. Steve Albrecht, Gerald W.
Wernz, and Timothy L. Williams, p. 145.
133
Chapter 6: Fraud Investigation and Audit
Evidence is not gathered to render an opinion on whether a fraud took place, nor is it gathered to
"prove" the fraud, because that can only be done in a court of law.
However, the evidence must be evaluated to determine if it is complete and accurate. If the
evidence is deemed insufficient, then more evidence may need to be gathered. The evidence can
also be evaluated to determine the company's best course of action (go to court, get the
perpetrator to confess, etc.).
A fraud report should never contain a conclusion or opinion as to whether a fraud actually took
place. When a case goes to court, the fraud report is admitted as evidence. If it contains
opinions and conclusions, the defending attorney can attempt to use them to show prejudice
toward the client.
134
Chapter 6: Fraud Investigation and Audit
• Develop a hypothesis using as many of the who, what, when, where, why, and
how elements as possible;
• Gather the evidence needed to test the hypothesis to see if it is accurate; and
• Refine and improve the hypothesis.
This approach gives the investigation structure and direction and helps the investigator avoid an
uncoordinated, ill-defined, and inefficient investigation. It is especially important to use this
approach when the fraud is large or complex. Without a hypothesis, an investigator strikes out
blindly, hoping to stumble onto evidence of importance.
Example: Suppose that CLR Corporation received an anonymous tip on its fraud
hotline saying that Kimberly Miles, a sales manager, was conspiring with
one of its customers, Ashton Industries.
135
Chapter 6: Fraud Investigation and Audit
As the investigation progresses, people closer and closer to the suspect are
interviewed. Among them are other customers and present and former
sales personnel (to see if Kimberly or people at Ashton had ever
approached them with under-the-table deals). Care must be taken to not
interview anyone who may be colluding with Ashton Industries or
Kimberly.
Evidence
Evidence is something that can help prove or disprove the facts of a fraud case. Documents,
testimony, objects, and facts can all be used as evidence.
The quality of evidence gathered can make or break a fraud case. For example, the evidence
gathered can be so pervasive that the perpetrator is convicted of fraud. On the other hand, the
evidence can be so weak that the case is dismissed. It is important to note that in between those
two extremes are many gradations of evidence pervasiveness.
All evidence gathered in a fraud investigation is admissible unless the trial judge decides that an
item of evidence does not meet the above standards. The investigator must be careful to meet all
of the above criteria or else the defense attorney is sure to question an item's admissibility as
evidence.
Most fraud investigators classify evidence into one of the following four types:
• Document evidence;
136
Chapter 6: Fraud Investigation and Audit
• Physical evidence;
• People evidence -- This includes witnesses, victims, informants, complainants, and
anyone else who can provide information about the fraud; and
• Personal observation.
Document Evidence
One of the most important types of evidence a fraud investigator gathers is document evidence
since it is the largest and the most frequently gathered type of evidence.
To a trained eye, documents can tell a great deal about a fraud. For example, a document can
disclose what happened, who performed a particular function, who authorized the amount of the
transaction, and much more. Documents also contain valuable information that can lead an
investigator to witnesses. The information of a canceled check, for example, can lead to the
teller who cashed it. The teller may remember who came in to cash the check and the
circumstances under which it was cashed.
Documents also provide a paper trail that shows an investigator what happened during each step
as the document was processed.
Documents have a number of distinct advantages. One of those is that they are not plagued with
the problems that attend some witnesses. For example, they do not forget important information,
cannot become flustered or confused during an opposing attorney's cross-examination, lie and
commit perjury, or tell inconsistent stories on different occasions.
137
Chapter 6: Fraud Investigation and Audit
o To create the chain, write a memo when it comes into your hands and every time
there is a change. The memo should show when the document was received and
from whom it was received.
• Where it is not possible to obtain physical possession of an existing original document,
make a copy of it. Copies are considered secondary evidence and are only permissible as
evidence when:
o The original has been lost or destroyed by someone other than the party
introducing it as evidence;
o An adverse party has control of the document and it can not be obtained;
o A public office has custody of the document; or
o A summary of the document is required because the original is too large to allow
it to be carefully examined.
• Develop a filing system that allows you to quickly find the documents you need.
Documents can be filed by witness, by transaction, or chronologically. For example, in the
Lincoln Savings and Loan case, the judge placed millions of documents in a document
depository. All interested parties could draw from the depository as needed.
• Create a database containing the following information:
o The date the document was created and the date it was received;
o The source of the document;
o The subject of the document and a brief description of its contents; and
o A number that identifies the document.
138
Chapter 6: Fraud Investigation and Audit
In addition, document examiners are sometimes hired to restore a document that has been torn,
mutilated, or burned.
Example: Suppose the investigator wanted to be 98-percent sure that not more than
one percent of the population contains a fraudulent item.
To determine the sample size, refer to Exhibit 6-2 and do the following:
• Since the table columns indicate the rate of occurrence in the
population, we select the second column from the right (an
occurrence rate of one percent).
• Look down that column until 98 percent is found.
• Move to the left to reach the leftmost column, which contains a
sample size of 400.
• Then, if 400 randomly selected items are audited and no evidence
of fraud is found, the investigation can be 98-percent sure that the
true population fraud rate does not exceed one percent.
139
Chapter 6: Fraud Investigation and Audit
Exhibit 6-2
Discovery Sampling Table
Probability (percentage) of including at least one error in the sample
Evidence can also be found by accessing public and private records. The next section discusses the
public records that are available and the information they contain.
Public Records
It is often necessary during a fraud investigation to find out information about people and
companies. For example, a fraud investigator might want to find out about the lifestyle and
spending habits of a person suspected of fraud.
In searching for information about others, it is important to obey privacy laws. However, obeying
these laws does not preclude anyone from finding out a great deal about a person or company by
140
Chapter 6: Fraud Investigation and Audit
searching public records. Some laws require that records of certain financial transactions be
disclosed and subject to review by the public.
There are many different sources of very valuable financial information, and they should be one of
the first items that a fraud investigator checks out. Public records are available from private
companies and the federal, state, and local governments.
Public Databases
Public databases contain a wealth of information, such as:
• Backgrounds of individuals;
• Bankruptcies;
• Employment histories;
• News stories about a person or company in newspapers and magazines;
• Real estate owned;
• Tax assessments on personal property;
• Tax liens; and
• Uniform Commercial Code (UCC) filings.
No listing of investigative databases would be complete, since new ones are created frequently.
However, a few of the more useful are listed below:
• CompuServ;
• Dialog;
• Dow Jones;
• Lexis/Nexis;
• Newsearch;
• Newsnet;
• Prentice-Hall Legal and Financial Services;
• Redi-Data Services; and
• Westlaw.
Credit Records
The Fair Credit Reporting Act was passed in 1971 to regulate the activities of credit, insurance,
and employment investigations. The law requires these companies to provide individuals with
any information the companies provided to a third party.
Federal Government
The federal government maintains an amazing amount of information on its citizens. Some of
the data is available to private fraud investigators and some is available only to law-enforcement
agencies. Having access to this data is only one of many good reasons to involve law-
enforcement agencies in fraud investigations.
141
Chapter 6: Fraud Investigation and Audit
The Justice Department also administers the offices of the U.S. Attorney and the
U.S. Marshal.
The FBI maintains the National Crime Information Center (NCIC), an electronic
database that contains information on a wide variety of stolen items, missing
persons, and people wanted on outstanding warrants. The FBI also maintains the
Interstate Identification Index, which is an offshoot of the NCIC. It is maintained
for the benefit of state and local law enforcement agencies and contains nationwide
information on arrests and criminal records.
• Department of Labor -- This department maintains records of worker's
compensation benefits.
• Department of State -- This department maintains passport and visa information. A
special office keeps track of everyone investigated for passport fraud.
• Department of the Treasury -- This department is in charge of the following four
agencies, each of which has databases with large quantities of valuable information:
• Bureau of Alcohol, Tobacco, and Firearms;
• U.S. Customs;
• Internal Revenue Service (IRS); and
• U.S. Secret Service.
• U.S. Postal Service -- The postal service has inspectors that investigate fraud using
the mail. Since most frauds make use of the postal service at some point, federal mail
statutes are important investigation tools. Most postal inspectors are eager to help and
easy to work with.
• Central Intelligence Agency (CIA) -- The CIA maintains records on people
applying for work in governmental agencies and on U.S. citizens employed in foreign
countries.
State Government
State governments also have resources that are useful to fraud investigators.
142
Chapter 6: Fraud Investigation and Audit
• State Attorney General -- This state office cooperates with local agencies to enforce all civil
and criminal state laws. Most states have an investigative division called the State Bureau of
Investigation.
• Comptroller's Office -- This office investigates violations of local tax laws.
• State Corrections Departments -- This department maintains records of all those who have
been imprisoned or placed on probation or parole.
• Alcoholic Beverage Control -- This board investigates violations of state and local
alcoholic-beverage laws.
• Secretary of State -- This office maintains a wealth of business records that reveal when an
organization was incorporated, its initial officers and board of director members, its principal
shareholders and business affiliations, and whether the corporation has paid its taxes. It is
especially useful in trying to identify dummy corporations, trace assets, determine conflicts of
interest, and evaluate changes in financial status. It also maintains Uniform Commercial
Code filings that contain information on loans and mortgages on personal property,
collateral on the loans, the organization loaning the money, and the company's or the
individual's bank.
• Department of Motor Vehicles -- These records can be accessed to obtain a person's name,
address, picture, date of birth, and driving history.
• Department of Business Regulation -- This department maintains records about people who
need a license or permit to work in their professions. These records provide business
addresses, professional credentials and specializations, and any investigations or complaints
about the individual.
• County Land Office -- This office maintains records of all the real estate in the county. For
each parcel of land, the records show the present and former owners, any indebtedness, the
mortgage holder, and trustees. These records sometimes reveal the identity of the seller, the
broker, and the attorneys involved in the transaction.
• Tax Assessor -- This office maintains property-tax records, which contain the property's legal
description, assessed value, and whether the taxes were paid.
• Law enforcement -- The police, sheriff, and county constable's offices maintain information
on arrests, indictments, convictions, incarceration, and probation.
• Courts -- The courts maintain information on bankruptcies, divorces, property settlements,
lawsuits, wills, and probate. These records may contain information about a suspect's lifestyle,
living expenses, debts, and inheritances.
143
Chapter 6: Fraud Investigation and Audit
Net Worth
The most popular method for determining the amount of money a perpetrator stole is a net-worth
calculation. It is a circumstantial rather than a direct method of proving that illicit income exists.
The technique is especially useful when the perpetrator receives cash or funds that cannot be
traced directly to them. The higher the percentage of illicit income to total income, the more
valuable the method is.
Net worth analysis reveals discrepancies between reported income and expenditures. The logic
behind the analysis is that one cannot spend more than one makes. These discrepancies can be
uncovered using either the asset method or the expenditure approach.
Asset Method
The asset method uncovers inconsistencies in revenue and expenses when the perpetrator uses
illicit income to purchase assets. For example, a $25,000-a-year bank clerk cannot afford a 40-
foot yacht and a Porsche convertible unless there has been a large inheritance.
Expenditure Method
The expenditure method is used when the illicit income is spent on expensive living, travel, and
entertainment, rather than to buy assets such as cars and boats. For example, the above-
mentioned bank teller could not afford to eat at expensive restaurants every night and take
multiple trips to South America and Europe.
Exhibit 6-3
Financial Profile Checklist
144
Chapter 6: Fraud Investigation and Audit
Credit cards • What was the purpose for the loan or debt?
• How were the proceeds used and where were they
Accounts payable deposited?
Taxes • What security, if any, was given for the debt?
Alimony, child • What documentation exists for the transaction and
support where is it?
• Was the debt written off as a bad loan for tax
purposes?
• Who was the creditor or lender?
Typical Sources of Funds For each source of funds, determine:
Salary Insurance proceeds • What was the total amount during a given period?
Commissions and
Gifts fees • What was the source?
• How was it paid for (currency, check, by other
Rental income Awards means)?
Dividends Inheritances • Where were the funds deposited?
Disability
Interest payments • How was it spent?
Sale of assets • What documentation exists and where is it?
Typical Expenditures For each major expenditure item, determine:
Rent and mortgage Clothing • What was the total amount spent?
• How was it paid for (currency, check, credit card,
Health costs Utilities etc.)?
Interest on loans Food • Where were the funds obtained to pay the expense?
Credit cards Insurance • What documentation exists and where is it?
Car payments Travel • When was the payment made?
The information needed for net-worth analysis is found by examining the public and private
records mentioned earlier. This information can be supplemented by interviewing vendors from
whom the subject purchased items.
The net-worth method is frequently used in fraud investigations. For example, the DEA uses it
to determine whether suspected drug dealers have illegal income from illicit sources. The IRS
uses it in tax-fraud cases to estimate a taxpayer's unreported income. The FBI also uses it.
The net-worth method produces a conservative calculation of the amount of money the
perpetrator has taken. As a result, it is readily accepted as documentary evidence in a court of
law.
The net-worth method is also very useful for obtaining perpetrator confessions. In an interview,
the investigators ask the perpetrators questions about financial status. When they catch the
perpetrators in enough lies, they reveal the information gathered and their calculations. The
145
Chapter 6: Fraud Investigation and Audit
perpetrators usually recognize that the investigators know both the financial situation and that
they have spent more money than they earned. They also realize it is futile to try and lie their
way out of the situation, and they confess.
+ Assets
– Liabilities
= Net worth
Net worth
– Net worth in prior period
= Net-worth increase
Net-worth increase
+ Living expenses
= Income
Income
– Funds from known sources
= Funds from unknown sources
Exhibit 6-4 is an illustration of the use of the net-worth method to calculate the amount of
money a person took from the company. The figures in the illustration were found using many
of the public records discussed above.
Exhibit 6-4
Net-Worth Analysis
Year 1 Year 2
146
Chapter 6: Fraud Investigation and Audit
Net-Worth Calculation
People Evidence
People in and out of the defrauded company are sources of evidence for fraud investigators.
Perpetrators do not live in a vacuum; they interact with others who are most likely to see a
change in their behavior. The people with whom the perpetrator interacts may notice that the
perpetrator has purchased a new home, car, or expensive toys or that they are hiding something
or acting strangely. For whatever reason, these people may actually know what the perpetrators
are doing or have strong suspicions. These are the people the fraud investigator wants to find.
One of the challenges of a fraud investigation is finding these people. Some may come forward
voluntarily; others may anonymously provide the information; and still others will not divulge
what they know until they are interviewed or interrogated. The last three of these are discussed in
this section.
147
Chapter 6: Fraud Investigation and Audit
• It should prompt investigations to show employees that the tips are taken
seriously by management. Such investigations can also keep the trail from
“getting cold.”
• Awareness campaigns, so employees are made aware of and periodically
reminded of the hotline and its guarantee of anonymity.
• Top management support, so everyone in the organization takes the hotline
seriously.
Interviews
An interview is a systematic questioning of people who might know something about a fraud. It
is one of the most important tools in the fraud investigator's tool bag. Interviews are used to
obtain the following:
• Information about the essential elements of the fraud;
• Information about a witness's personal background and motives;
• Cooperation from victims and witnesses; and
• Leads to witnesses or other evidence to help build the case.
Types of Interviewees
An investigator will interview the following three distinct types of people.
• Cooperative interviewees -- These people are overly helpful, and the investigator
must carefully determine their motives. Do the interviewees have a sincere desire to
help? Are they trying to get even with the suspect? Are they trying to direct attention
away from themselves as suspects?
• Neutral interviewees -- They have no hidden motives or agendas. They have nothing
to gain or lose from the interview and are usually the most helpful and objective of all
the interviewees.
• Hostile interviewees -- They are often associated in some way with the suspect or the
crime. They are the most difficult to interview and normally should be interviewed
without prior notice. The element of surprise makes it harder for hostile interviewees to
prepare defenses.
Interview Phases
A good interview has three distinct phases.
• Introduction -- The purpose of the interview should be clearly stated. Background
information about the person is obtained as is a commitment to cooperate with the
investigation.
• Body -- Here is where the person is questioned to determine the facts of the fraud. The
interviewer should make every effort to find out as much about the who, what, when,
where, why, and how of the fraud.
• Close -- The investigator should thank interviewees for their cooperation. The
investigator should also ask for leads by asking if there is anything else to discuss or
anyone else to talk to.
Interview Guidelines
The following guidelines, if followed, will produce the most useful interviews.
148
Chapter 6: Fraud Investigation and Audit
• Carefully plan the interview to maximize the information received and minimize the time
conducting it.
• Determine in advance as many facts as possible about the fraud and the person being
interviewed.
• Determine when to conduct the interview. If the interviewee is believed to be cooperative
or neutral, set up an appointment. The best interview location is the interviewee’s place of
business since there is greater access to any needed papers, books, or people. Look for a
room where distractions from colleagues and telephones can be eliminated or minimized.
Allow more than enough time for each interview.
• Select a room that is as bare as possible. Do not have a desk or other physical barrier
between you and the person being interviewed. This provides the investigator with a full
view of the body posture and language of the suspect. Sit approximately four to five feet
away from the interviewee. Stay seated; do not walk around the room.
• Interview one person at a time and inform each interviewee ahead of time of any
information that will be needed in the interview.
• Conduct the interview in a professional manner. Remember that you are seeking the truth,
not trying to get a confession or a conviction.
• Ask short questions that are clearly and easily understood. Avoid asking yes and no
questions; instead ask questions that require narrative answers. Do not ask leading
questions that suggest part of the answer.
• Concentrate on the interviewee's answer rather than the next question you plan to ask.
Make sure you understand the answer before you continue.
• Control the interview. Do not allow interviewees to wander, get you sidetracked, confuse
the issue, or not answer important questions.
• Be courteous, respectful, and polite and do not talk down to the person. Do not be
authoritarian or attempt to dominate the interview. Be friendly but maintain a professional
distance.
• Be sensitive to personal matters such as gender, race, religion, and ethnic background.
Avoid politically incorrect language, and do not use technical jargon.
• Be sympathetic, where appropriate, and tell the person that anyone might have done the
same thing if the circumstances were the same.
• Do not take notes during the interview. Ask permission to tape the interview.
• Ask the interviewee to provide the factual basis for conclusions.
• Thank the interviewee for taking the time and trouble to cooperate.
• Denial -- A person's first reaction to any crisis is denial. People manifest their denial by
refusing to accept that the fraud occurred, insisting that there is some mistake, acting stunned
or dazed, or being unable to comprehend what took place. The denial phase is dangerous to
149
Chapter 6: Fraud Investigation and Audit
the company since it provides the perpetrator with time to hide, change, or destroy
documentary evidence.
• Anger -- Once people realize that a fraud actually did take place, they become angry. Their
anger may cause them to strike out at those around them and to say and do things they later
regret. Sometimes this results in lawsuits for slander, libel, assault, battery, or wrongful
termination. For obvious reasons, this stage is not a good time to try and investigate or resolve
frauds.
• Rationalization -- In this stage, people try to explain away or minimize the fraud. They
rationalize that:
o The fraud was not all that bad;
o The perpetrator must have had a good reason; or
o The perpetrator is a good person who made a mistake and deserves a second
chance.
o Interviews during this stage can lack objectivity, make finding the truth difficult,
and harm prosecution efforts. The rationalizations lead to a decision not to
prosecute, to weak testimonies and to easy penalties.
• Depression -- As a person realizes the fraud is more than just a little mistake, a period of
depression sets in. This is often caused by a sense of loss, disappointment, or embarrassment.
If people withdraw, lose interest, or become uncooperative, they may not be willing to help
with the investigation. Interviews in this stage are often not as useful as those in the
acceptance stage.
• Acceptance -- Most people affected by a fraud eventually accept what happened, put it
behind them, and move on. The acceptance stage can be reached faster and easier by
explaining the perpetrator's motivations and sharing the facts surrounding the fraud.
Interviews in this stage are the most useful since witnesses are the most willing to help and
cooperate.
Interrogation
An interrogation is a structured interview of a suspect or target for the purpose of obtaining a
voluntary and legally binding confession of guilt.
• Purposes -- An interrogation has three main purposes:
o To obtain an admission of guilt. However, many fraud perpetrators do not
confess during an interrogation.
o To identify and neutralize any defenses the perpetrator may raise.
o To obtain information that can be used to impeach the perpetrator.
Information impeaching a suspect's honesty is almost as good as a
confession.
150
Chapter 6: Fraud Investigation and Audit
Investigators can move from one to the other. For instance, an interview can turn
into an interrogation if the investigator begins to suspect the interviewee is guilty.
Likewise, an interrogation can turn into an interview if the investigator perceives
the interviewee not to be guilty.
The suspect is usually the last person the investigator interviews. An investigator
cannot be too prepared for this interrogation since the strength of the case may
depend heavily on a confession or evidence to impeach the suspect. The
interrogation should only be conducted when:
o As much information as possible has been gathered from sources other
than the suspect;
o There is evidence that only the suspect can provide; and
o The investigator is able to control the time and place, as well as the subject
matter of the interrogation.
151
Chapter 6: Fraud Investigation and Audit
Personal-Observance Evidence
Most auditors use observation as a means of gathering evidence in their audits. For example,
they observe the client taking inventory and test count it. Fraud investigators also observe items
or activities of interest. However, they expand the observation evidence to include surveillance,
undercover operations, and invigilation.
Surveillance
Surveillance is the secret and continuous observation of persons, places, and things to obtain
information about the identity and activity of individuals suspected of fraud. It provides
evidence that is probably not available through any other means.
Surveillance can be stationary, such as a stakeout, where the investigator does not move,
or it can be a moving surveillance, where the investigator follows the subject moving
152
Chapter 6: Fraud Investigation and Audit
from place to place. Electronic surveillance is the use of some sort of electronic device,
such as a hidden tape recorder or video camera.
Great care should be used to make sure that surveillance does not violate applicable
privacy laws. It is a good idea to receive clearance from human resources and the legal
department before using surveillance as a tool in a fraud case.
Undercover Operations
In an undercover operation, a person assumes a new identity in order to gather information about
a fraud. These operations require a high degree of skill and planning to be successful. Done
properly, they can produce a great deal of information and evidence. If the surveillance
backfires, someone could get hurt or the company could blow its whole case.
An undercover operation is best used when there is collusive fraud on a large scale that cannot be
investigated thoroughly in any other way. It is wise to use or consult law-enforcement agencies
in undercover operations.
Searches
Searching a suspect's desk, locker, or other work area can produce valuable evidence. However,
improper searches can open an investigator and the company to many charges. These charges
include assault, battery, false imprisonment, invasion of privacy, slander, defamation, wrongful
or abusive discharge claims, or grievances and arbitration in a union environment.
Invigilation
Invigilation is a process of observing and controlling company activities so closely for a period
of time that fraud is virtually impossible. Company results before or after the period of
invigilation are then compared to the results during the fraud.
153
Chapter 6: Fraud Investigation and Audit
Physical Evidence
Physical evidence is the least-used type of evidence in a fraud investigation. In other crimes, it
involves the examination and analysis of items such as murder weapons, drug paraphernalia, etc.
A fraud investigation can sometimes involve the examination and analysis of things like:
• Fingerprints;
• Broken locks;
• Physical objects, such as stolen inventory;
• Substances, such as grease and fluids;
• Traces, such as paints and stains; and
• Impressions, such as cutting marks and tire tracks.
Case Study
Directions:
1. Review the information.
2. Use the space provided for your notes.
The Facts:
The property/casualty insurance industry estimates that 10 percent of the $200 billion in annual
claims payouts is bogus. Insurance and law-enforcement officials say that the profits from fraud
are enormous and the chance of prosecution is usually small. Consider the following three types
of scams:
1. Staged car accidents, in which con artists hire people to cause a collision so they can
inflate legal and medical bills.
154
Chapter 6: Fraud Investigation and Audit
2. Faked deaths, especially those taking place overseas. Desktop publishing systems are
used to create authentic-looking copies of death certificates. In Long Beach, Calif., these
certificates had a street value of up to $1,000. In addition, for the right amount of money,
officials in some countries are willing to hand out death certificates.
The fraud was detected when the storeowner's son let it slip to Transamerica's
broker that the claim was inflated. The ensuing investigation revealed that
Berson, Rigney, and Stern were all linked to several other suspicious claims.
Investigators got the storeowner to confess to his part of the scheme and to tape
Berson saying that if everyone "kept their mouths shut," Transamerica would
suspect nothing and pay the claim. With the scam falling apart, Casati, Berson, and
Stern plea-bargained; Rigney was convicted of fraud.
The Justice Department, the Postal Service, and the IRS undertook a massive
investigation into these types of property losses. What did the investigation
uncover?
• The U.S. Postal Inspector on the case stated that he had never seen such pervasive
fraud in his 21 years as an investigator.
• More than 100 defendants were accused of cheating insurance companies out of
more than $500 million by fabricating or inflating claims; over 90 have been
convicted.
• Insurance claims adjusters admitted to taking bribes of up to $75,000 per claim.
Case Questions:
155
Chapter 6: Fraud Investigation and Audit
3. What can insurance companies do to increase the likelihood of detecting bogus claims?
2. The property/casualty claims adjusting process is susceptible to fraud for the following
reasons:
a. Claims of less than $50,000 are rarely investigated.
b. Insurance companies are forced to rely on independent contractors over whom
they have little control to estimate the damages.
c. There are few checks on employee honesty and there are many opportunities to
commit fraud.
3. Insurance companies can take the following steps to detect fraudulent claims:
a. Pay attention to details such as photos that do not show the reported damage and
water beaded up on surfaces days after an accident supposedly happened. (Note:
One investigator found two claims to totally different insurance companies that
had the exact same damage photos.)
b. Pay special attention to water damages, as they are a common theme of many
property/casualty claims. (Note: One public adjuster had a plumber install a
urinal in a business so employees could break the connecting pipes and cause
water damage.)
c. Inspect more claims sites.
156
Chapter 6: Fraud Investigation and Audit
However, there is concern that there will be a cascade effect. Of special concern is the possibility
that the Act may influence other federal and state legislative or rule changes. That could result in
Sarbanes-Oxley requirements trickling down and directly affecting small businesses, nonpublic
companies subject to other regulations, and the CPAs that provide services to them.
157
Chapter 6: Fraud Investigation and Audit
158
Chapter 6: Fraud Investigation and Audit
Criminal Penalties
Sarbanes-Oxley created several penalties.
• Individuals who willfully fail to maintain audit and review workpapers for at least five
years can be convicted of a felony, with penalties of up to 10 years. The law instructs the
SEC to establish a rule covering the retention of audit records. The PCAO Board is to issue
standards that compel auditors to keep other documentation for seven years.
• Destroying documents in a federal or bankruptcy investigation is a felony, with penalties of
up to 20 years.
• Securities-fraud criminal penalties were increased to 25 years.
• The statute of limitations for the discovery of fraud was changed. It is now extended to the
earlier of two years (rather than one) from the date of discovery and five years (rather than
three) after the act.
• Sarbanes-Oxley bans personal loans to executives and directors.
• The Act prohibits insider trading during blackout periods.
• Directors, officers, and 10% owners must report certain transactions by the end of the
second business day following the day on which the transaction was made.
• A violation of the Sarbanes-Oxley Act or of any SEC or PCAO Board rule is treated as a
violation of the SEC Act of 1934.
• Employees of public-companies and accounting firms are given “whistleblower protection”
when they lawfully disclose private employer information to certain parties when there is a
fraud claim.
159
Chapter 6: Fraud Investigation and Audit
Struggling to cope with the new forces of the marketplace, Enron realized it was necessary to
change its business strategies in order to turn a profit. The company resorted to assistance from
the consulting firm of McKinsey and Company. There, a young consultant named Jeffrey
Skilling was given the task of improving Enron’s approach. Skilling was indeed the remedy to
Enron’s woes; in fact, he came up with an innovative plan that revolutionized the gas-pipeline
business.
Skilling created the idea of a “gas bank” in which Enron would purchase gas from a ring of
suppliers and then sell it to a group of consumers. The price and supply were both guaranteed in
the form of a contract, and Enron extracted fees for transactions and for assuming the risks. This
idea of the energy derivative immediately took off, and Enron’s CEO, Kenneth Lay, rewarded
Skilling’s ingenuity by making him head of the newly created Enron Finance Corporation in
1990.
Enron soon became one of the world’s leading energy, commodities, and service companies by
marketing electricity and natural gas, delivering energy and other physical commodities, and
providing financial and risk-management services to customers around the world.2 By the early
1990s, Enron Corporation had established itself as one of the largest corporations in the United
States and was a favorite of Wall Street as the leading trader of electricity in the nation. On the
2001 Fortune 500 list, Enron ranked seventh with revenues of $101 billion in the year 2000.3 In
2
www.enron.com.
3
www.fortune.com.
160
Chapter 6: Fraud Investigation and Audit
early January 2001, shares of Enron stock were trading for slightly more than $80 a share, and
the market capitalization of the company was around $60 billion.
Cracks Appear
Enron’s success of the 1990s would not last, however. The company’s good fortune really began
to sour at the beginning of 2001, and the company hit rock bottom on December 2, 2001 when it
voluntarily filed for Chapter 11 reorganization with the U.S. Bankruptcy Court for the Southern
District of New York. To date, Enron’s $63 billion filing is one of the largest corporate
bankruptcies in United States history.
What led to this demise of such massive proportions? First of all, Enron’s corporate culture
made conditions ripe for wrongdoing. The company adopted a diehard obsession with being the
best, and that obsession was filtered down through the ranks. Enron sought out the best
employees and the brightest recruits, while showering them with limitless merit-based bonuses.
The perks of being affiliated with one of the world’s top corporations, however, did not come
without a price. Pressure to deliver solid earnings was exuded through every facet of the
company. Performance reviews became little more than profit-assessment evaluations where
employees were sized up through a merciless ranking system. Internal competition and secrecy
reigned wildly and the burden of delivering immediate tangible profits caused the company to
value instant earnings rather than slowly maturing deals.
Enron’s financial difficulties started in the late 1990s when the company incurred millions of
dollars of investment losses. Despite the company’s apparent financial difficulties, Enron
executives began to look for ways to hide the company’s losses instead of getting financial help
and making early, full public disclosures. This was done to meet Wall Street’s demand for
smoothly growing earnings and to keep the company’s stock price rising. Enron employed all
kinds of tactics to remove assets from its books, and executives started running mysterious off-
balance-sheet partnerships. Assets were taken off Enron’s books and parked with partnerships
controlled by Enron executives.4 Debt was taken on by the related partnerships and then ignored
in Enron’s audited financial statements.5 Enron disclosed as little as possible about these
partnerships, and financial-statement users were left with a set of highly complicated financial
statements that were difficult to understand.6 In short, Enron was cooking the books.
Enron’s partnerships were only part of the financial scandal. Enron was also overly aggressive
in its use of mark-to-market accounting. Mark-to-market accounting entails pricing securities at
their fair value and running gains or losses through the income statement. While mark-to-market
accounting is not illegal in and of itself, it creates the potential for abuse and manipulation of the
financial statements, especially when companies have no benchmark of fair value. Enron’s long-
term energy contracts were priced in an illiquid market where there was no benchmark of fair
value. As a result, Enron often relied on internal models to determine the fair value of its
securities, which created the potential for abuse and manipulation of the financial statements.7
Under grueling pressure to deliver ever-higher earnings, Enron‘s valuation estimates probably
4
Stewart, Thomas. “Two Lessons From the Enron Debacle,” Business 2.0, December 5, 2001.
5
Schonfeld, Erick. “Enron is Dead. Long Live Enron,” Business 2.0, December 7, 2001.
6
McLean, Bethany. “Why Enron Went Bust,” Fortune, December 24, 2001.
7
McLean, Bethany. “Monster Mess,” Fortune, February 4, 2002.
161
Chapter 6: Fraud Investigation and Audit
significantly overstated earnings. In fact, in 2000 unrealized trading gains made up more than
half of Enron’s stated $1.41 billion pretax profit.8
Driven to diversify, Enron clung to the notion of being the world’s largest trading market for
every type of industry it entered. Unfortunately, Enron also overextended itself in many areas
and was too arrogant to admit defeat. Take Enron’s lofty venture into broadband, for example.
In January 2000, Enron went public with its plan of constructing a high-speed broadband
telecommunications network. The ill-fated firm figured it could cash in on the Internet
technology boom by trading bandwidth just as it had built a grandiose empire around energy
trading. While Enron dumped millions and millions of dollars into the project, the investment
sustained a stingy return. Wall Street, however, turned a blind eye to this fact, and instead
rewarded the venture with an even higher stock price. Fortune and other magazines repeatedly
praised Enron as one the most admired companies in the world.
Perhaps more telling than the Andersen memo was a letter sent to chairman and CEO Kenneth
Lay in August 2001. Sherron Watkins, Enron’s vice president of corporate development, sent the
letter to Lay expressing concern that Enron would “implode in a wave of accounting scandals.”
Watkins complained about the “veil of secrecy” that surrounded the so-called special-purpose
entities in which Enron masked hundreds of millions of dollars of debt and investment losses.
She also indicated that company officials “consistently and constantly” complained about the
company’s accounting practices to former Enron CEO Jeffrey Skilling. The letter raised
questions about Lay’s knowledge of the company’s inner workings. Lay reacted to the letter
with concern and surprise and assured Watkins he would look into the matter. He asked Enron’s
8
Thomas, C. William. “The Rise and Fall of Enron,” Today’s CPA, March/April 2002.
162
Chapter 6: Fraud Investigation and Audit
law firm, Vinson and Elkins, to look into the matter, but Enron suggested the lawyers should not
“second-guess the accounting treatment” given by the company’s auditor, Arthur Andersen.9
In a testimony before the House Energy Commerce Committee on February 14, 2002, Watkins
expanded on what she wrote in her August 2001 letter by saying that Skilling had considerable
knowledge about the controversial private partnerships run by the firm’s former chief financial
officer, Andrew Fastow. Watkins also testified that she believed Mr. Skilling and Mr. Fastow,
along with the accounting firm Arthur Andersen and Enron’s legal counsel, Vinson and Elkins,
duped Kenneth Lay and the board of directors.10
In October 2001, Enron announced a third-quarter loss of $638 million and indicated that its
value was $1.2 billion less than had previously been reported. In November 2001, Enron
restated its earnings since 1997, reducing profits by nearly $600 million.
For the next couple of years, the Enron fraud sparked lengthy investigations into many aspects of
the company, several of which are still unresolved. On March 11, 2002, the chairman of the
Commodity Futures Trading Commission indicated that the government would investigate
whether Enron Corporation committed fraud or manipulated markets through improper trading.
The Justice Department, the Securities and Exchange Commission, and a dozen congressional
committees are still investigating Enron, its accounting practices, and the influence Enron’s
longtime auditor Arthur Andersen had on Enron’s accounting practices. The Labor Department
is investigating Enron’s actions in banning employees who lost their retirement savings from
selling stock in their §401(k) plans for about three weeks. Finally, the Federal Energy
Regulatory Commission is examining energy-price manipulation by Enron and other traders in
Western wholesale power markets,11 especially since former Enron energy trader Jeffrey S.
Richter pleaded guilty in February 2003 to criminal conspiracy while attempting to manipulate
California’s energy markets during its 2000-2001 electricity crisis.
In January 2005, 10 of the 18 former directors settled a class-action lawsuit by agreeing to pay a
total of $13 million from their own pockets. This sum is rather meager considering that the group
sold shares worth $250 million prior to the collapse of the company.
Furthermore, findings show that the compensation committee gave its stamp of approval on
issuing Ken Lay a $7.5 million credit line while allowing him to pay back those loans with
company stock. No board member seemed to catch on to the suspicious fact that Lay cashed out
9
Dizikes, Peter. “Arthur Andersen Fires Chief Enron Auditor,” www.Abcnews.com, January 15, 2002.
10
Douglass, Linda and Yesner, Stephen. “Enron Whistle-Blower Rips Execs in Congress,” www.Abcnews.com, February
14, 2002.
11
Gordon, Marcy. “Government Investigates Enron Trade Fraud,” www.Newsday.com, March 12, 2002.
163
Chapter 6: Fraud Investigation and Audit
$77 million worth of Enron stock in a single 12-month period. Other conclusions prove that the
board was told as early as 1999 by its auditing firm, Arthur Andersen, that Enron was “pushing
the limits” of accounting practices.12 While the board was cleared of any disciplinary action by
the SEC in September 2002, it still has a lot of explaining to do. Inquiries into the actions and
inactions of Enron’s board of directors have simply turned up more and more blame.
A Painful Lesson
Enron’s auditing firm, Arthur Andersen, on the other hand, has undergone severe punishment in
the aftermath of the Enron fiasco. In April 2002, David Duncan pleaded guilty to obstruction of
justice for his document-shredding shenanigans. Six months later, in October 2002, Arthur
Andersen was sentenced to five years probation and fined $500,000 for obstruction of a federal
investigation of Enron, the maximum penalty dictated by law. A few years later (May 2005),
this sentence was overturned by the Supreme Court. While Andersen eventually won its case, it
seems highly unlikely that it can ever return to is level of prominence in the accounting industry.
Andersen still faces civil suits from its Enron audits, as well as suits from other former clients.
However, the recent Supreme Court ruling may make it easier for Andersen to defend itself. The
federal Enron Task Force could also invoke further prosecution if it determines that the people
managing and reporting Enron’s earnings can be charged with stock manipulation.
The tarnished reputation of the former Big Five accounting firm has cost the company more than
penal fines, however; the conviction has stripped Arthur Andersen of its entire core business. As
of August 31, 2002, Andersen ceased auditing public companies, and the firm currently employs
a meager 200 workers, down from the 28,000 workers it employed at its peak. The flames of the
Enron inferno have almost single-handedly sucked the life out of the 89-year-old firm.
Arthur Andersen is not the only entity that has been punished for its dishonesty. In September
2003, Ben Glisan Jr., former Enron treasurer, pleaded guilty to conspiracy charges and became
the first former Enron executive to be sent to jail. Glisan was sentenced to five years.
On October 31, 2002, Andrew Fastow, former Enron CFO, was indicted on 78 counts for
devising the accounting practices that artificially inflated Enron’s profits. Fastow’s wife Lea,
along with seven other former executives, was also charged on May 1, 2003 for taking part in
some of her husband’s deals. The pair pleaded guilty on January 14, 2004, after striking an
agreement: Andrew pleaded guilty to conspiracy in a deal and received a 10-year sentence (later
reduced to six years) with a requirement to help in the ongoing investigation, while his wife
admitted guilt in filing false tax forms and received a 12-month prison sentence. In addition,
Andrew Fastow settled civil charges with the SEC by surrendering more than $23 million in civil
and criminal penalties.
In November 2006, two Enron executives received reduced sentences after helping prosecutors
convict the architects of Enron’s accounting fraud. Mark Koenig, the former investor-relations
head, received a sentence of 18 months. He pleaded guilty in August 2004 to one count of aiding
and abetting securities fraud and could have served as many as 10 years in jail. Michael Kopper,
who was at one time the top lieutenant to Andrew Fastow, was sentenced to just over three years
in jail. He pleaded guilty to money-laundering and conspiracy to commit wire fraud in 2002 and
12
Byrne, John A. “No Excuses for Enron’s Board,” Business Week, July 29, 2002.
164
Chapter 6: Fraud Investigation and Audit
could have faced up to 15 years in jail. Both men were fined $50,000 each, and after prison will
be on probation for two years.
The indictments have not stopped there. On January 22, 2004, Richard Causey, former chief
accountant at Enron, was indicted on six counts including conspiracy and fraud charges. Causey
pleaded guilty on December 28, 2005 to securities fraud. In exchange for cooperating with the
government he received only a five and a half year prison sentence, which he started serving at
the beginning of 2007. After serving his time in prison, he will be on probation for two more
years and will pay a $25,000 fine, to go along with the additional $1.5 million that he has already
agreed to pay or forfeit.
A month after Causey’s indictment in 2004, Enron’s former CEO Jeffrey Skilling was finally
indicted after over two years of investigation. Skilling was indicted on 35 counts including
insider trading, conspiracy, securities fraud, and wire fraud. In July 2004, Lay was charged with
and pleaded not guilty to 11 criminal counts. He immediately went on the offensive, holding a
press conference to proclaim his innocence. He laid the blame for the company’s downfall on
former CFO Andrew Fastow.
In May 2006, Skilling and Lay were both convicted of conspiracy and fraud. However, Lay died
from a heart attack on July 5, 2006, and his convictions were dropped, since he did not have a
chance to appeal. It appears that Lay’s estate will get to keep all of his Enron proceeds unless
civil court proceedings change things. In May, Skilling was convicted in federal court on 19
counts. He was sentenced in October 2006 to over 24 years in jail, but it now appears that he
may serve much less time in jail, since the Fifth Circuit Court of Appeals has criticized many of
the verdicts against Skilling. However, it is unlikely that all 19 counts will be dropped, so he
will face some time in prison.
The Enron web of deceit has also continued to grow as more and more companies have found
their entanglements with the firm coming to light. For example, in September 2002, a complaint
was filed in the federal court in Houston citing the role of Merrill Lynch and Company in
knowingly aiding a bogus transaction to boost Enron’s quarterly earnings. In November 2004,
five former executives from Enron and Merrill Lynch were convicted of conspiracy and wire
fraud. Because their crimes cost the company at least $12 million, each could receive a 12-year
jail sentence. Later, in December 2002, it was revealed that Citigroup and J.P. Morgan Chase
helped Enron hide debt or avoid taxes in previously undisclosed deals.
Although some firms have had to pay for their participation in the Enron fraud, others have been
able to escape liability from the class-action lawsuit. In December 2006, a $1 billion claim
brought against investment firm Alliance Capital Management LP, now known as
AllianceBernstein LP, was dismissed. The claim had to do with alleged fraud relating to its
underwriting of Enron securities. Then in March 2007, a federal court ruled that Enron
shareholders could not continue with a class-action lawsuit against banks and other firms for
their alleged participation in Enron’s accounting fraud.
Internal employees were not the only ones deeply affected by the company’s collapse. In July
2004, Enron was granted approval to be removed from bankruptcy protection, under a plan that
165
Chapter 6: Fraud Investigation and Audit
grants creditors a return of a mere $.20 on the dollar from their investments. Shareholders,
however, will receive absolutely nothing.
Regardless of how all the investigations and negotiations turn out, one thing is for certain: the
Enron case taught the world an alarming lesson about the comprehensiveness and subtleties of
fraud, as well as the consequences and penalties of greed. Fortunes, companies, and lives have
been shattered as a direct result of allowing wily accounting mechanisms to compensate for
simple honesty. Fortunately, public disgust and outrage has helped create new legislation and
regulations to crack down on corporate fraud. Hopefully, with these new procedures in place,
the corporate world can work to ensure that Enron does not repeat itself somewhere else.13
LDDS, WorldCom’s predecessor, was created in the months following the coffee-shop meeting.
After a rocky period laced with financial difficulties, Bernie Ebbers became CEO of LDDS in
1985 and took over the helm of the company. Ebbers was a master at cutting costs, and under
his direction the company was steered back on course once again. In August 1989, Ebbers took
LDDS public.
For the next 15 years, LDDS grew through a flurry of acquisitions. Ebbers’ strategy was to grow
his company through buying other firms and adding them to the LDDS stockpile. Helping to
stimulate the telecommunications boom of the 1990s in the process, Ebbers made over 70
acquisitions that often shocked the industry. Unfortunately, this strategy was not infallible;
LDDS funded its purchases through heavy debt that bogged the company down in a massive
mire of loans.
One of Ebbers’ larger acquisitions occurred in 1994 when LDDS purchased IDB WorldCom, the
fourth-ranked carrier of international long-distance calls at the time. LDDS renamed itself
WorldCom Inc. one year later.
13
For more information on the Enron scandal, see the following article: Thomas, C. William. “The Rise and Fall of Enron,” Today’s
CPA, March/April 2002.
166
Chapter 6: Fraud Investigation and Audit
In 1998 Ebbers used the growth-through-acquisition strategy once more and WorldCom reached
its pinnacle. After winning a bidding war with British Telecom, WorldCom and industry giant
MCI joined forces in a $42 billion merger, the largest merger in history at the time. Operating in
more than 65 countries, the new MCI WorldCom was crowned America’s number two long-
distance phone company.
At the same time Ebbers was expanding WorldCom at such a rapid pace, he was also recklessly
growing his own personal entrepreneurial empire. Borrowing millions at a time from corporate
banks and from WorldCom itself, Ebbers purchased a diverse array of companies. These
companies ranged from an all-terrain-vehicle dealership to a soybean-and-rice farm in Louisiana
to a minor-league hockey team. In 1999, Ebbers purchased 460,000 acres of timberland (an area
large enough to cover half the state of Rhode Island) in the southeastern United States from
Kimberly-Clark for a whopping $400 million. Previously, in 1998, he spent over $65 million to
buy the famous 500,000 acre Douglas Lake Ranch in British Columbia. The purchase
personified Ebbers’ over-the-top business style and breathless yearning for expansion: the
Douglas Lake Ranch is the largest privately held ranch in Canada, complete with 20,000 head of
Hereford and crossbreed cattle, its own general store, and a fly-fishing resort.
All of the expansion experienced by WorldCom, as well as by Ebbers’ personal kingdom, earned
nothing but rave reviews on Wall Street and in the media. WorldCom stock became a darling of
analysts and investors alike with its double-digit growth. Then, in June 1999, the company’s
stock peaked at $64.51 a share. The most sought-after athlete in the world, Michael Jordan,
appeared in WorldCom’s commercials. And CEO Bernie Ebbers was ranked by Forbes
magazine as one of the richest men in America.
During this same time period, behind the facade of indefatigable public vigor, WorldCom was
beginning to experience problems. The debt and expenses from WorldCom’s mass acquisitions,
often purchased at inflated prices, were finally beginning to take their toll. Further complicating
the enormous debt bloating the company, the stock market began to fall, along with long-
distance rates and subsequent sales. Taken together, WorldCom’s situation was especially
precarious.
167
Chapter 6: Fraud Investigation and Audit
Despite these difficult times, WorldCom continued to grow in profitability, at least according to
the firm’s financial statements. Under immense pressure to expand and support its stock price,
WorldCom knew any reversal in this upward trend would not be easily condoned by Wall Street.
As CEO, Ebbers was especially obsessed with keeping the company’s stock price up. He began
meetings with a prayer, immediately followed by a discussion about how to enhance the price of
WorldCom’s stock.
It was Sullivan who decided to take a more aggressive approach to the company’s accounting
practices as market conditions weakened in the telecommunications industry early in 2001. Not
wanting to let on to the public that WorldCom was struggling, Sullivan sought to dilute reality by
rearranging certain financial-statement accounts. Instead of properly reducing profits, Sullivan
spread costs to a future time when he figured future revenue would roll in and swallow up the
loss.
For example, one of WorldCom’s largest expenses, known as “line costs,” was for transport
charges and renting access to local telephone networks. By booking a part of these line expenses
as a capital expenditure in 2001, WorldCom was able to amortize a monstrous $3.1 to $3.8
billion hunk of these charges over a period of time, possibly as much as 10 years, and come out
with a healthy net income of $1.38 billion. According to generally accepted accounting
principles (GAAP), however, these line costs should have been recorded as an operating
expense. Following GAAP in this case would have required WorldCom to subtract the entire
line-cost expense out of the revenues produced for that quarter, resulting in a loss. Sullivan,
concerned about his company’s image, decided he would take his chances with the creative
accounting.
Suspicions Arise
As WorldCom’s expense-hiding practices continued, most of the public was still hoodwinked
into thinking the company was thriving. However, some astute investors were convinced that
WorldCom smacked of misconduct. In June 2001, a group of WorldCom shareholders formally
filed a lawsuit against the firm. The suit included testimonies from a dozen former WorldCom
employees, who described the same problems that eventually destroyed the company a year later.
Unfortunately, the lawsuit was dismissed.
As the year 2002 unfurled, WorldCom wariness had spread all the way to the Securities and
Exchange Commission (SEC). An inquiry into the company’s accounting practices was soon
underway. Later, in May, the SEC took the company by surprise when it submitted a request for
168
Chapter 6: Fraud Investigation and Audit
information. Because WorldCom had continued to report a profit throughout 2001 when its
biggest competitors were losing money, suspicion about the firm’s numbers was sufficiently
heightened.
Additionally, the SEC launched an investigation into the loans WorldCom had approved to
Bernie Ebbers for his personal investments. One loan, granted by Max Bobbitt, the head of
WorldCom’s audit committee, was for a hefty $408 million.
On April 30, 2002, Ebbers resigned as WorldCom’s CEO in an attempt to quell some of the
controversy surrounding his company. John Sidgmore, WorldCom’s vice-chairman, replaced
Ebbers and immediately ordered an internal review of the company’s books. WorldCom’s new
outside auditor, KPMG, as well as WorldCom’s internal-audit team, was given the grisly job of
uncovering the truth. (KPMG had replaced Arthur Andersen as WorldCom’s auditor once it
came to light that Andersen was entangled in the Enron scandal.)
After raising questions about curious financial inconsistencies to various superiors without
getting any convincing explanations, Cooper decided that if she wanted answers she was going
to have to find them herself. Her boss, CFO Scott Sullivan, offered no support. She
immediately told her department that they would begin self-imposed financial audits of the
information WorldCom was reporting to the public even though no one had assigned them this
responsibility.
On May 28, 2002, Gene Morse, one of Cooper’s auditors, discovered $500 million in fraudulent,
undocumented computer expenses that were recorded as capital expenditures. Cooper and her
team continued to dig for more clues. By the first week of June, Morse had uncovered a total of
$2 billion in questionable accounting entries by accessing WorldCom’s computerized accounting
systems. A week later when Cooper casually mentioned the audit she was working on to her
boss to gauge his reaction, Sullivan immediately requested that she delay the audit until the next
quarter. Cooper refused. On June 20, with help from KPMG, Cooper presented her team’s
findings to WorldCom’s board.
169
Chapter 6: Fraud Investigation and Audit
On July 21, 2002 WorldCom declared bankruptcy to the astonishment of absolutely no one.
WorldCom’s Chapter 11 filing eclipsed that of Enron Corporation, from the year before, to
become the largest bankruptcy filing ever in U.S. history. The company listed over $100 billion
in assets with the number of creditors exceeding 1,000. Additionally, WorldCom’s debt was
ballparked at $32.8 billion.
In August, Scott Sullivan and Buford “Buddy” Yates, a former midlevel accounting executive
who carried out Sullivan’s orders, were indicted by the federal grand jury in New York. Both
were charged with one count of conspiring to commit securities fraud, one count of securities
fraud, and five counts of making false filings with the SEC.
By March 2003, five former WorldCom executives had been indicted or charged by Manhattan
prosecutors in connection with the scandal. All pleaded guilty -- except for Sullivan. However,
after 18 months and almost $14 million in attorney fees, Sullivan finally gave in on March 2,
2004 and pleaded guilty to all three counts of securities fraud charged against him. In exchange
for his plea, Sullivan traded the possibility of 165 years in jail if proven guilty for a sentence that
capped jail time to 25 years. At his plea hearing, the former CFO fessed up to investors by
saying “I knew what I was doing was wrong ... I did this in a misguided effort to preserve the
company.”14 Sullivan was later given a five year prison sentence, and he was forced to surrender
his $11 million Florida mansion and his depleted WorldCom retirement account.
Later that same day, another breakthrough in the WorldCom investigation came in the form of an
indictment, this time for former CEO Bernard Ebbers, who had so far staved off charges that he
knew what was going on with WorldCom’s creative accounting. Thanks to Sullivan’s newfound
cooperation, authorities were finally able to secure charges against the former CFO’s boss.
Ebbers’ indictment consisted of the same three charges levied against Sullivan: conspiracy to
commit securities fraud, securities fraud, and making false statements to the SEC. Ebbers
pleaded not guilty.
Ebbers’ trial began in late January 2005. He was convicted on nine counts and received a 25
year prison sentence. The conviction was upheld by an appeals court, so Ebbers, age 64, will
likely spend the rest of his life in prison. The outcome of his trial was important because it
provides insight into how future CEOs, who claim they knew nothing of the wrongdoing within
their corporations, will be dealt with by juries.
In addition to federal charges, the state of Oklahoma filed criminal charges against WorldCom,
Sullivan, Ebbers, and four other executives for violating state security laws in August 2003.
Frustrated at federal investigators for taking so long to punish those most directly involved in the
massive fraud, Oklahoma’s attorney general initiated the charges to bring some justice to
shareholders in Oklahoma and elsewhere. The charges were dropped against the company seven
months later in return for jobs in the state and help in prosecuting former executives.
14
Berman, Dennis K. “Sullivan Gives In, Pleads Guilty,” The Wall Street Journal, March 3, 2004.
170
Chapter 6: Fraud Investigation and Audit
restatements. What was once $3.8 billion of financial misstatements soon became $7.2 billion
and then $9 billion in November 2002. The SEC rewarded these corrections with even more
fraud charges expanding the purported types of financial manipulations that occurred. One
additional complaint alleged that WorldCom kept a secret “cookie jar” stash of reserves used to
infuse the bottom line whenever the company needed to offset expenses. On March 12, 2004,
WorldCom restated financial results for 2000 and 2001, reducing pretax income by $74.4 billion.
Fraud was said to account for $10.8 billion of the adjustment.
On November 26, 2002, WorldCom announced that it had reached a settlement with the SEC to
resolve claims from the civil lawsuit regarding WorldCom’s former misguided accounting
practices. The agreement was seen as a significant milestone in the firm’s restructuring strategy.
Days later marked another change for WorldCom: Michael Capellas began his new assignment
as WorldCom’s latest CEO. As former CEO of Compaq Computers, and then president of
Hewlett-Packard Co. after Compaq and HP merged, Capellas came into office pledging to
continue to restructure WorldCom and lead it out of bankruptcy without hawking off large
portions of company assets. Later, on May 20, 2003, the company agreed to pay investors $500
million to settle fraud charges, taking another step toward emerging from bankruptcy.
In March 2003, WorldCom revealed that it would write down $79.8 billion of its goodwill and
other assets-- an action viewed as an acknowledgement that several areas of the firm’s
telecommunications holdings were practically worthless. While WorldCom previously alluded
to making the write-downs, many analysts were surprised by the size of the amounts. The
company’s reductions were second only to AOL Time Warner’s markdowns of almost $100
billion in assets. Following through with the markdowns, however, is another significant step for
WorldCom to recover from bankruptcy: the move allows the firm to shrink its depreciation and
amortization expenses from about $480 million in December 2002, to $143 million.
In January 2005, the company’s lead investment banker, Citigroup, paid $2.65 billion to settle
claims by investors affected by the company’s demise, and 10 former WorldCom directors have
agreed to personally provide $18 million to settle the same lawsuit. This disbursement is
important because it sends the critical message to directors that they can also be held accountable
if they don’t keep a close watch on the workings of their company. In April 2006, Citigroup
agreed to pay $13.25 million to settle a lawsuit that alleged that Jack Grubman, a star
telecommunications analyst at Citigroup, gave overly optimistic research about WorldCom in
order to increase investment-banking business.
As is to be expected, restructuring the company has come at a costly price, including thousands
of layoffs. In February 2003, WorldCom employed just 60,000 workers, down 17,000 from the
prior year, with 10,000 more employees receiving pink slips in subsequent months.
Additionally, WorldCom made arrangements to consolidate facilities to reduce square footage by
26 percent and to engage in extensive cost-cutting endeavors.
The road out of bankruptcy has been a steep, uphill climb. However, for being listed as one of
the worst frauds ever in American business, WorldCom has recently done an impressive job of
instituting best-in-class corporate governance practices and controls to rebuild faith in the
company. Besides hiring Michael Capellas to head the company, WorldCom has also
171
Chapter 6: Fraud Investigation and Audit
completely replaced the board and executive officers. WorldCom made it a point to fill the open
positions with individuals known for integrity, including independent board members Eric
Holder, former U.S. Deputy Attorney General, and Dennis Beresford, former chairman of the
Financial Accounting Standards Board. In April 2003, the company hired Robert Blakely, a
well-respected former CFO of Tenneco, as its new CFO. WorldCom also conducted a thorough
internal investigation to root out any company employees that had a high likelihood of being
aware of what was going on with the company during its shadier days. Fifty individuals were
asked to resign as a result.
WorldCom has made striking progress in cleaning up its past. The company emerged form
bankruptcy protection in 2004 and formally changed its name to MCI. MCI was acquired by
Verizon in January 2006 for $8.6 billion. MCI passed on a bid by Quest Communications that
was $1.3 billion higher than Verizon’s in exchange for a stronger position in the market as well
as a stronger financial position.
For Rigas and family, who were each released on a $10 million personal recognizance bond, it
was a day of rude awakening.
The road to this unpleasant day for the Rigas family had started out innocently, as do most cases.
Little did John Rigas know that the apparently safe road he traveled at the beginning would only
lead to a dead end.
In the Beginning
John J. Rigas was born in 1924 to a Greek immigrant who ran a restaurant in eastern New York.
Rigas had served in the Armored Infantry Division of the United States Army during World War
II and later attended Rensselaer Polytechnical Institute. Rigas graduated in 1950 with a B.S. in
Management Science.16
15
“Adelphia officials arrested, charged with massive fraud,” Wall Street Journal, July 25, 2002, A3.
16
http://www.sabres.com/team/rigas.html.
172
Chapter 6: Fraud Investigation and Audit
Rigas was a character. He was 5 feet 5 inches tall. He had a “gap-toothed smile, a wandering left
eye, and a ton of energy.” His father had wanted him to work at the restaurant when he returned
home from college, but after a few months John realized he could do much better. He was loaned
money from his dad and other Greek businessmen and bought a movie theater for $72,000 in
Coudersport, Pennsylvania. Rigas made it all happen himself -- he sold tickets, made the
popcorn, and at times would sleep on a cot in the theater when he was too tired to make it
home.17
However, Rigas seemed determined to win everybody over. He stayed until midnight talking to
moviegoers after the lights went up. He stopped people on Main Street to talk about their kids.
He began attending the Episcopal Church preferred by the town’s business leaders, even though
he was raised in the Greek Orthodox faith.18
Rigid Rigas
Rigas was just as determined about winning his fortune as he was about establishing a credible
reputation amongst Coudersport residents. In 1952 he overdrew his bank account to buy the town
cable franchise for $300 from a local hardware store owner who had erected an antenna on Dutch
Hill. A doctor and a state senator agreed to put up $40,000, and John was in the cable business.
He wired up Coudersport. Four years later, he and his brother Gus did the same in Wellsville.
After wiring the town, John acquired more rural cable systems in New York and Pennsylvania.
From these beginnings, the two brothers steadily acquired cable systems in communities
throughout Western Pennsylvania and Western New York State. In 1972, they incorporated their
holdings in Adelphia Communications Corporation. Gus sold his interest in Adelphia in 1983,
which was about the same time John’s sons returned from college.19
John pushed himself even after successful expansion of his cable company, never being quite
satisfied. He and Doris pushed their children just as hard. They raised Michael, Tim, and James
to be model students. Michael and James were class valedictorians. One by one the Rigas
children went off to elite colleges. But for all their winning qualities, there was something odd
about the Rigas boys. Unlike their father, they were awkward socially. The boys clearly
preferred being with their immediate family in Coudersport. Not long after getting their degrees,
Michael and Tim moved back in with their parents. Neither married. James spent a year and a
half in San Francisco after graduating from Stanford, working at Bain and Company, but then he
too returned to Coudersport, where he married and moved into a place of his own in town. "John
17
Leonard, Devin. “Adelphia Story,” Fortune, August 12, 2002, p. 140.
18
Ibid., p. 140.
19
Ibid., p. 142.
173
Chapter 6: Fraud Investigation and Audit
just controlled everything with those boys," lamented a relative. "He wouldn't give them any
rope."20
All three sons went to work for their father. John could not have been happier. He now had three
highly qualified young men to help run his cable company.
Rigas and his sons came to be considered savvy businessmen. John was the resident wiseman,
but he was also obsessed with details. He knew every inch of his cable systems; he looked at
each résumé that came in. Michael was responsible for the daily operations of the cable systems.
Tim was CFO. James supervised Adelphia's push into new technologies, including telephone
service.22
To anybody who followed John Rigas' career, what happened with Adelphia's financing was
predictable. Rigas and his sons were famous in the cable industry for taking massive risks and
leveraging Adelphia to the hilt. Rigas once said to his secretary “Well Angie, I’m either going to
become a millionaire or I’m going to go bankrupt.” Go figure.
The small-town businessman who had boasted about his stomach for leverage now saddled
Adelphia with outlandish amounts of debt. In 1996, Adelphia's debt was 11 times its market
20
Ibid., p. 144.
21
Ibid., p. 144.
22
Ibid., p. 144.
23
Ibid., p. 144.
174
Chapter 6: Fraud Investigation and Audit
capitalization, an off-the-chart number. Adelphia began commingling revenues from its own
cable operations, family-owned systems, and loan proceeds in an account referred to internally,
according to documents filed recently with the SEC, as the "cash-management system." It would
be an understatement to say that this was a significant amount of money. After Adelphia made a
series of acquisitions in 1999, its annual revenues reached $3 billion. From time to time the
Rigas family dipped into the account for “personal business,” such as the following:
• $63 million was used to pay margin loans.
• $4 million was used to buy Adelphia stock.
• $700,000 was used to pay for Tim's membership in the Golf Club at Briar's Creek
on John's Island, South Carolina.
• $371,000 went to Dobaire Designs, owned by Doris Rigas, for design services.
• $2 million went to Wending Creek Farms, owned by John Rigas. The fees were
charged to Adelphia for snowplowing and lawn care.
• $3 million was paid to SongCatcher Films to finance production of a movie being
produced by Ellen Rigas, John’s daughter.
• $12 million was paid to Eleni Interiors, a furniture store owned by John himself
and managed by his wife Doris.
• $13 million was paid to the golf club at Wending Creek Farm to develop a ritzy
golf club.
• $26 million was paid to Wending Creek 3656 for company timber rights that
would eventually turn into a Rigas partnership.
• $65 million was paid to Praxis Capital Ventures to fund a venture capital firm run
by Rigas’ son-in-law.
• $150 million went to the Niagara Frontier Hockey LP to purchase the Buffalo
Sabres hockey team of the NHL.
• $1 billion went to Highland 2000 to guarantee a loan to the Rigas family, with
which they would buy stocks.24
• The TOTAL was $1,339,071,000.
King of Coudersport
The Rigas family did not particularly care if investors shied away from Adelphia's stock. They
cared about Coudersport. As Adelphia prospered, John Rigas became the town's biggest
benefactor. He was just a small-town guy who loved helping his neighbors. He sent busloads of
children to Buffalo Sabres games (since Rigas was the owner of the hockey club). He used
Adelphia's corporate jet to fly ailing people to faith healers and cancer treatment centers. He
hired many locals and paid them well. Employees built suburban-style houses. The newspaper
store started selling fancy coffee. A gym opened on Main Street. The Adelphia Christmas party
became the "fancy-dress event in Coudersport, a chance to hobnob with the Rigases and socialize
in suits over catered canapés," said Donald Gilliland, managing editor of the Potter Leader-
Enterprise. John combed the local papers and sent checks to down-on-their-luck families. People
seeking favors camped out in Rigas' favorite restaurants, waiting for the CEO to arrive for lunch.
He rarely turned anybody down. In a celebratory video, Decker Anstrom, CEO of the Weather
Channel, said, "If there's one person I'd like my son to grow up to be, it would be John Rigas."25
24
Ibid., p. 140.
25
Ibid., p. 138.
175
Chapter 6: Fraud Investigation and Audit
Coudersport treated the Rigases like royalty, and they behaved accordingly. John now traveled in
a Gulfstream jet, which Adelphia purchased from King Hussein of Jordan. Doris rarely ventured
into town, sending servants to do her shopping. No expense seemed to be spared. Sometimes
people in Coudersport even wondered whether all the spending was legitimate, but the thought
would pass. It seemed as though everyone in town had benefited from John's largesse. "He's our
Greek god," Shirlee Lette, a local newspaper columnist, told a visiting reporter.26
The Rigases had no sources of income outside Adelphia. Each time Cohen tried to get an
explanation, Adelphia rebuffed him. In February 2001, Cohen noticed that the Rigases had
bought or were committed to buying $1.8 billion of Adelphia stock and convertible bonds. At the
time of the purchases the stock had been trading at about $40 a share. Now it was at $20. If John
and his sons were using borrowed money, the Rigases were in trouble. It was time to call
Adelphia again. "It seems to me the Rigases are $900 million or $1 billion in the hole," Cohen
said to the head of investor relations. "How is this stuff being funded?" He got the brush-off.28
On March 27, 2002, Cohen nearly shouted for joy when he spied a footnote on the last page of
Adelphia's quarterly earnings press release. It said Adelphia was liable for $2.3 billion in off-
balance-sheet loans to the Rigas family. Near the end of a conference call that day, Cohen
pressed Tim Rigas for details. Tim muttered something about family stock purchases and said he
would provide details later.29
That might have sufficed in the past, but it was just months after the disclosure of off-balance-
sheet debt at Enron had led to the largest corporate bankruptcy in history at that time. Adelphia's
stock tumbled 35 percent in three days. The SEC began an investigation. In addition to
overstating cash flow, Adelphia had inflated its subscriber data by between 400,000 and 500,000
members.30
26
Ibid., p. 148.
27
Ibid., p. 146.
28
Ibid., p. 148.
29
Ibid., p. 148.
30
Frank, Robert. “Adelphia inflated subscriber data,” Wall Street Journal, June7, 2002, A3.
31
Leonard, Devin. “Adelphia Story,” Fortune, August 12, 2002, p. 148.
176
Chapter 6: Fraud Investigation and Audit
Rigas was succeeded by interim CEO Erland Kailbourne, a retired Fleet Bank executive and
Adelphia "independent" director. Kailbourne was a consummate Rigas family insider, an old
friend from Wellsville, and a lot of observers suspected that John might still pull the strings.32
Fortunately Kailbourne remedied the situation by replacing himself with a new CEO and COO
from AT&T, although the action was not easily accomplished due to shareholders who objected
to their high salaries. That is a story in and of itself, but the executives at Adelphia felt that the
salaries were necessary because of the challenges of running a company that by that point faced
roughly $20 billion in debt, several government inquiries, and huge investor lawsuits.33
The independent directors had signed off on the lending agreements, but thought the Rigases
were buying more cable systems, not taking out what were essentially margin loans to buy
Adelphia stock. John had made them look like fools. Kailbourne and the three other independent
directors hired David Boies, the attorney who led the case against Microsoft, to look into
Adelphia's books.34
Adelphia's stock was soon worth pennies. The company was delisted by NASDAQ because it did
not file its 2001 annual report. That triggered the default of $1.4 billion in Adelphia convertible
bonds. Bankruptcy was all but certain. The company desperately needed a loan to stay afloat, but
Wall Street was not about to lend it any more money as long as the Rigases were around. The
family still held 100 percent of the company's class B voting stock. Technically they were still in
control of Adelphia.35
The problem was that John Rigas did not think he had done anything wrong. The day after he
resigned as chairman and CEO, he startled the independent directors by showing up at a
directors' meeting. Surely, he told them, this mess could be sorted out and things would get back
to normal. No, John, said his old friends, you and the boys have to go. Lawyers from Boies' firm
tried to negotiate a severance package with John but could not reach an agreement. Finally the
independent directors gave the Rigas family an ultimatum: The family could turn over their
voting shares to the directors, or they would resign and go public with everything they had
uncovered. After an all-night negotiating session on May 22, 2002 in Coudersport, the Rigases
finally relinquished control at 5 a.m. Adelphia received a $1.5 billion bank loan. Since then,
Adelphia has filed for Chapter 11 bankruptcy.36
177
Chapter 6: Fraud Investigation and Audit
entertainment. Rigas’ response was simply that “in the last five years, as cable has embraced
more adult programming, we’ve never spent time thinking about reversing our decision.” While
the adult-programming industry will benefit from Adelphia’s fall, other competing cable
companies will be hurting, in addition to companies that provide shows to Adelphia and
technology vendors that supply Adelphia with services and gear. Rival cable operators have
found themselves under much pressure with so many investors wary of debt and similar
Adelphia-like “shenanigans.”38
The Aftermath
The ripple effects of this fraud case, like Enron, will be felt for some time. The Adelphia stock
can be found listed now in “Pink Sheets” (a daily publication that lists the “bid” and “asked”
prices of many over-the-counter stocks), where it sold as low as two cents.39 Erland Kailbourne,
the ex-interim CEO, believes that Adelphia will not have to sell out completely, although many
of its 1,200 Coudersport employees will be laid off. 40 His prognosticating abilities have come
true in many ways, as the headquarters has since moved from Coudersport to Denver,41 and with
the induction of new executives at Adelphia things are beginning to look up.
One noteworthy event is the rise in the market that occurred the day of John Rigas’ arrest,
implying the widespread approval of the government’s somewhat-tardy action against
corporate/white-collar crime.
John Rigas -- charged with fraud, arrested, suspected of tax violations, and facing a $1 billion
lawsuit filed by Adelphia -- still believes that he did nothing wrong. The courts of justice, on the
other hand, disagreed with Rigas; in fact, he, his sons, and Adelphia’s former director of internal
reporting, Michael Mulcahey, were indicted in September 2002 on charges they looted the
company out of hundreds of millions of dollars. In addition, the family has been sued by
Adelphia for concealing evidence of fraud and creating fictitious documents and accounting
books to mislead auditors.42
On February 23, 2004, the trial officially began for John Rigas, his sons Timothy and Michael,
and Mulcahey, in Federal District Court in downtown Manhattan. All four were previously
charged with conspiracy, securities fraud, wire fraud, and bank fraud. Bank fraud alone, the
most severe count the four faces, carries a maximum sentence of 30 years. The Rigas family and
Mulcahey, however, have pleaded not guilty, in spite of the guilty plea of two former executives
who agreed to cooperate with government officials.43 These executives, James Brown, the
former vice president of finance, and Timothy Werth, the former accounting director, will no
doubt be called to the stand to testify that boss Timothy Rigas and kin had knowledge that what
they were doing was wrong.
The Rigas trial concluded in July 2004. The jury convicted John and Timothy Rigas of a single
count of conspiracy, two counts of bank fraud, and fifteen counts of securities fraud. The jury
found them not guilty of five counts of wire fraud. John Rigas was sentenced to 15 years in jail,
38
“Adelphia’s Fall Will Bruise a Crowd,” Business Week, July 8, 2002, p. 44.
39
http://www.pinksheets.com/quote/quote.jsp?symbol=adelq.
40
Lieberman, David. “CEO lays plans for Adelphia’s future.” USA Today, June 27, 2002 C1.
41
http://online.wsj.com/article/0,,SB1043791845385455784,00.html
42
Frank, Robert. “Adelphia Files fraud suit against Ex-Auditor Deloitte.” Wall Street Journal, November 7, 2002, A2/A10.
43
“Former Adelphia executive pleads guilty in Fraud Case.” Wall Street Journal, January 10, 2003.
178
Chapter 6: Fraud Investigation and Audit
and Timothy was sentenced to 20 years. Both have appealed. Mulcahey Rigas was found not
guilty on all 23 counts against him. In November 2005, Michael Rigas pleaded guilty to making
false entries to Adelphia’s records. He faces up to three years in prison.
Adelphia, now under the direction of chairman and CEO William Schleyer, continues to stay
afloat with over 5.3 million cable subscribers in over 30 states. Even in bankruptcy, the
company is valued at $17 billion. The company was placed on the auction block in late 2004. By
the bid deadline in January 2005, it had attracted some major bidders, including a $17.6 billion
bid by Time Warner Inc. and Comcast Corp., as well as several large private-equity corporations.
Adelphia has subsequently accepted the Time Warner and Comcast bid, and the deal should take
about a year to close. In August 2006, Time Warner
and Comcast completed the acquisition of Adelphia. Time Warner’s cable unit took 3.3 million
of Adelphias’s subscribers, and Comcast took 1.7 million Adelphia subscribers in exchange for
$12.5 billion in cash and Time Warner Cable common stock.
Through it all, Rigas still receives cards from Coudersport residents who remain faithful, and
says that “most of the cards end with a message that is most meaningful and that is that ‘you are
in our prayers.’ It does bring a tear to my eye.”44 Perhaps he has even shed a tear or two for the
thousands of Adelphia shareholders who have shed some tears of their own.
44
Leonard, Devin. “Adelphia Story.” Fortune, August 12, 2002, p. 148.
179
Chapter 6: Fraud Investigation and Audit
Famous Frauds
The following table shows the sentence and forfeitures of some of the more famous fraud
perpetrators of the last decade or two.
180
Chapter 6: Fraud Investigation and Audit
181
Chapter 6 Review Questions
The review questions accompanying each chapter are designed to assist you in achieving the
learning objectives stated at the beginning of each chapter. The review section is not graded; do
not submit it in place of your final exam. While completing the review questions, it may be
helpful to study any unfamiliar terms in the glossary in addition to chapter course content. After
completing the review questions for each chapter, proceed to the review question answers and
rationales.
2. With regard to the four-step investigation strategy, determining if, in fact, a fraud actually
occurred is the objective of the:
4. With regard to the four-step investigation strategy, what is often the only evidence
available to support the fraud investigation is the result of the:
A. True.
B. False.
182
Chapter 6 Review Questions
A. Documentary evidence.
B. People evidence.
C. Personal observation.
D. Physical evidence.
A. Consent.
B. Court order.
C. Subpoena.
D. Search warrant.
A. Is used when the illicit income is spent on expensive living, travel, entertainment,
and buying assets such as cars and boats.
B. Uncovers inconsistencies in revenue and expenses when the perpetrator uses illicit
income to purchase assets.
C. Is used when the illicit income is spent on expensive living, travel, and
entertainment, rather than to buy assets such as cars and boats.
D. Uncovers inconsistencies in revenue and expenses when the perpetrator uses illicit
income to spend on expensive living, travel, entertainment.
10. True or false: The net-worth method produces a conservative calculation of the amount
of money the perpetrator has taken and, as a result, is readily accepted as documentary
evidence in a court of law.
A. True.
B. False.
183
Chapter 6 Review Questions
12. Which of the following interviewee types are usually the most helpful and objective of all
the interviewees?
A. Cooperative interviewees.
B. Neutral interviewees.
C. Guilty interviewees.
D. Hostile interviewees.
13. Which of the following stages of those affected by fraud includes people insisting that
there is some mistake, acting stunned or dazed, or being unable to comprehend what took
place?
A. Denial.
B. Anger.
C. Rationalization.
D. Depression.
14. True or false: The difference between an interview and an interrogation is that an
interrogation is conducted to obtain information about the fraud, while an interview is
conducted to obtain a confession or information that can impeach the suspect.
A. True.
B. False.
15. The secret and continuous observations of people, places, and things to obtain
information about the identity and activity of individuals suspected of fraud are known
as:
A. Surveillance.
B. Undercover operations.
C. Searches.
D. Invigilation.
16. The observation evidence technique that is a process of observing and controlling
company activities so closely for a period of time that fraud is virtually impossible is
known as:
A. Surveillance.
184
Chapter 6 Review Questions
B. Undercover operations.
C. Searches.
D. Invigilation.
17. True or false: Physical evidence is the most-used type of evidence in a fraud
investigation.
A. True.
B. False.
18. The SEC appoints the five full time members of the PCAOB which consists of:
19. Near the end 1999, WorldCom’s situation was made especially precarious because:
A. It carried enormous debt and the stock market, long distance rates, and subsequent
sales all began to fall.
B. Energy prices were beginning to tumble and a world recession was on the
horizon.
C. It overextended itself with a plan to construct a high-speed broadband
telecommunications network.
D. Its directors signed off on lending agreements that were essentially margin loans
to buy company stock.
20. True or false: The Adelphia fraud engineer, John Rigas, still receives cards from
Coudersport residents who remain faithful, and says that “most of the cards end with a
message that is most meaningful and that is that ‘you are in our prayers.’
A. True.
B. False.
185
Chapter 6: Review Question Answers and Rationales
Review question answer choices are accompanied by unique, logical reasoning (rationales) as to
why an answer is correct or incorrect. Evaluative feedback to incorrect responses and
reinforcement feedback to correct responses are both provided.
A. Problem recognition and definition phase. This answer is correct because the
objective of the problem recognition and definition phase is determining if
there is sufficient cause, or predication, to investigate the fraud symptoms.
B. Evidence collection phase. This answer is incorrect because the objective of the
evidence collection phase is determining if fraud actually occurred, not
determining if there is sufficient cause, or predication, to investigate the fraud
symptoms.
C. Evidence evaluation phase. This answer is incorrect because the objective of the
evidence collection phase is determining if the evidence collected is sufficient to
effectively evaluate and report the fraud.
D. Report findings phase. This answer is incorrect because the objective of the
evidence collection phase is to write up the fraud report,.
2. With regard to the four-step investigation strategy, determining if, in fact, a fraud actually
occurred is the objective of the:
A. Problem recognition and definition phase. This answer is incorrect because the
objective of the problem recognition and definition phase is determining if there is
sufficient cause, or predication, to investigate the fraud symptoms, not
determining if a fraud actually occurred.
B. Evidence collection phase. This answer is correct because the objective of the
evidence collection phase is determining if a fraud actually occurred.
C. Evidence evaluation phase. This answer is incorrect because the objective of the
evidence collection phase is determining if the evidence collected is sufficient to
effectively evaluate and report the fraud.
D. Report findings phase. This answer is incorrect because the objective of the
evidence collection phase is to write up the fraud report.
A. Problem recognition and definition phase. This answer is incorrect because the
objective of the problem recognition and definition phase is determining if the
evidence collected is sufficient to effectively evaluate and report the fraud.
B. Evidence collection phase. This answer is incorrect because the objective of the
evidence collection phase is determining if a fraud actually occurred.
186
Chapter 6: Review Question Answers and Rationales
4. With regard to the four-step investigation strategy, what is often the only evidence
available to support the fraud investigation is the result of the:
A. Problem recognition and definition phase. This answer is incorrect because the
objective of the problem recognition and definition phase is determining if there is
sufficient cause, or predication, to investigate the fraud symptoms.
B. Evidence collection phase. This answer is incorrect because the objective of the
evidence collection phase is determining if fraud actually occurred.
C. Evidence evaluation phase. This answer is incorrect because the objective of the
evidence collection phase is determining if the evidence collected is sufficient to
effectively evaluate and report the fraud.
D. Report findings phase. This answer is correct because the objective of the
evidence collection phase is writing up the fraud report, which is often the
only evidence available to support the fraud investigation.
A. True. This answer is incorrect because a fraud report should not contain a
conclusion or opinion as to whether a fraud actually took place.
B. False. This answer is correct because a fraud report should not contain a
conclusion or opinion as it can be used as evidence in court, and opinions
could show prejudice.
A. Documentary evidence. This answer is correct because the largest and most
frequently gathered type of evidence is documentary evidence.
B. People evidence. This answer is incorrect because, although the people who
interact with the fraud perpetrator on a day to day basis may know what the
perpetrator is doing, these people may be difficult to find.
C. Personal observation. This answer is incorrect because, although personal
observation may provide evidence not available through any other means, the
high cost and relative danger related to it makes documentary evidence easier to
collect.
D. Physical evidence. This answer is incorrect because physical evidence is the least
used evidence type due to its relative absence in a fraud case.
187
Chapter 6: Review Question Answers and Rationales
A. Is used when the illicit income is spent on expensive living, travel, entertainment,
and buying assets such as cars and boats. This answer is incorrect because the
expenditure method is used when the illicit income is spent on expensive living,
travel, entertainment, rather than buying assets such as cars and boats.
B. Uncovers inconsistencies in revenue and expenses when the perpetrator uses
illicit income to purchase assets. This answer is correct because the asset
method uncovers inconsistencies in revenue and expenses when the
perpetrator uses illicit income to purchase assets.
C. Is used when the illicit income is spent on expensive living, travel, and
entertainment, rather than to buy assets such as cars and boats. This answer is
incorrect because the expenditure method is used when the illicit income is spent
on expensive living, travel, entertainment, rather than buying assets such as cars
and boats.
188
Chapter 6: Review Question Answers and Rationales
D. Uncovers inconsistencies in revenue and expenses when the perpetrator uses illicit
income to spend on expensive living, travel, entertainment. This answer is
incorrect because the expenditure method is used when the illicit income is spent
on expensive living, travel, entertainment, rather than buying assets such as cars
and boats.
10. True or false: The net-worth method produces a conservative calculation of the amount
of money the perpetrator has taken and, as a result, is readily accepted as documentary
evidence in a court of law.
A. True. This answer is correct because it is true that the net-worth method
produces a conservative calculation of the amount of money the perpetrator
has taken and, as a result, is readily accepted as documentary evidence in a
court of law.
B. False. This answer is incorrect because it is true that the net-worth method
produces a conservative calculation of the money the perpetrator has taken and is
also very useful for obtaining confessions.
12. Which of the following interviewee types are usually the most helpful and objective of all
the interviewees?
189
Chapter 6: Review Question Answers and Rationales
13. Which of the following stages of those affected by fraud includes people insisting that
there is some mistake, acting stunned or dazed, or being unable to comprehend what took
place?
A. Denial. This answer is correct because in the denial stage people refuse to
accept that the fraud occurred, insisting that there is some mistake, acting
stunned or dazed, or being unable to comprehend what took place.
B. Anger. This answer is incorrect because in the anger stage people may strike out
at those around them and to say and do things they later regret.
C. Rationalization. This answer is incorrect because in the rationalization stage
people try to explain away or minimize the fraud.
D. Depression. This answer is incorrect because in the depression stage people may
become withdrawn and lose interest, or become uncooperative.
14. True or false: The difference between an interview and an interrogation is that an
interrogation is conducted to obtain information about the fraud, while an interview is
conducted to obtain a confession or information that can impeach the suspect.
15. The secret and continuous observations of people, places, and things to obtain
information about the identity and activity of individuals suspected of fraud are known
as:
190
Chapter 6: Review Question Answers and Rationales
16. The observation evidence technique that is a process of observing and controlling
company activities so closely for a period of time that fraud is virtually impossible is
known as:
17. True or false: Physical evidence is the most-used type of evidence in a fraud
investigation.
A. True. This answer is incorrect because physical evidence is the least used type of
evidence in a fraud investigation.
B. False. This answer is correct because document evidence is the largest and
most frequently gathered type of evidence.
18. The SEC appoints the five full time members of the PCAOB which consists of:
A. One Non-CPA member and four CPA members. This answer is incorrect because
the Non-CPA members outnumber the CPA members. There must be three Non-
CPA members and two CPA members.
B. Four Non-CPA members and one CPA member. This answer is incorrect because
there is actually more than just one CPA member. There must be three Non-CPA
members and two CPA members.
C. Two Non-CPA members and three CPA members. This answer is incorrect
because the required Non-CPA members and the required CPA members have
been reversed. There must be three Non-CPA members and two CPA members.
D. Three Non-CPA members and two CPA members. This answer is correct
because the PCAOB members must consist of three Non-CPA members and
two CPA members.
19. Near the end 1999, WorldCom’s situation was made especially precarious because:
191
Chapter 6: Review Question Answers and Rationales
A. It carried enormous debt and the stock market, long distance rates, and
subsequent sales all began to fall. This answer is correct because
WorldCom’s enormous debt, the stock market began to fall, as well as long
distance rates and subsequent sales made its situation especially precarious.
B. Energy prices were beginning to tumble and a world recession was on the
horizon. This answer is incorrect because energy prices beginning to tumble and
a world recession on the horizon made Enron’s situation precarious.
C. It overextended itself with a plan to construct a high-speed broadband
telecommunications network. This answer is incorrect because overextending
itself with a plan to construct a high-speed broadband telecommunications
network made Enron’s, not WorldCom’s, situation precarious.
D. Its directors signed off on lending agreements that were essentially margin loans
to buy company stock. This answer is incorrect because directors signing off on
lending agreements that were essentially margin loans to buy company stock
made Adelphia’s situation precarious.
20. True or false: The Adelphia fraud engineer, John Rigas, still receives cards from
Coudersport residents who remain faithful, and says that “most of the cards end with a
message that is most meaningful and that is that ‘you are in our prayers.’
A. True. This answer is correct because, even though John Rigas defrauded
investors out of millions of dollars, he still receives cards from Coudersport
residents who remain faithful.
B. False. This answer is incorrect because it is true that, even though John Rigas
defrauded investors out of millions of dollars, he still receives cards from
Coudersport residents who remain faithful.
192
Chapter 7: Review of Statement on Auditing Standards No. 99
According to Statement on Auditing Standards (SAS) No. 47, determining the nature, timing,
and extent of the audit procedures is directly related to the auditor’s consideration of audit risk.
SAS No. 47 also indicates that part of audit risk is the risk that the financial statements are
materially misstated due to fraud. Accordingly, fraud risk must be considered when making
inherent- and control-risk assessments and when designing auditing procedures.
SAS No. 82, Consideration of Fraud in a Financial Statement Audit, was issued in 1997 by the
Auditing Standards Board (ASB). Its purpose was to provide operational guidance to auditors on
how to better consider material fraud while conducting a financial-statement audit. Subsequently,
several panels and committees were organized and several studies of fraud were conducted to
determine how to improve audit procedures and guidance with respect to fraud.
In response to their findings, a Fraud Task Force was formed to revise SAS No. 82. The result is
SAS No. 99, also titled Consideration of Fraud in a Financial Statement Audit. The ASB
believes the requirements and guidance in SAS No. 99 will substantially improve audit
performance and increase the likelihood that auditors will detect material fraudulent financial
statements. Much of the improved performance will come from an increased focus on
professional skepticism as well as the requirement to ask management and other employees
about the existence of fraud in the company.
Unfortunately, it is not possible for an auditor to be absolutely sure that the financial statements
are free of material fraud. According to SAS No. 99, a “material misstatement may not be
detected because of the nature of audit evidence or because the characteristics of fraud may
cause the auditor to rely unknowingly on audit evidence that appears to be valid, but is, in fact,
false and fraudulent. Characteristics of fraud include concealment through (a) collusion by both
internal and third parties; (b) withheld, misrepresented, or falsified documentation; and (c) the
ability of management to override or instruct others to override what otherwise appear to be
effective controls.”
Although auditors have a responsibility to detect material fraud, management has the
responsibility of designing and implementing controls and programs to prevent and detect fraud.
However, members of management are not the only ones who are responsible for overseeing the
financial-reporting process. For example, the board of directors and the audit committee help
establish appropriate controls to prevent and detect fraud. They also have a responsibility to help
set a proper organizational tone and create and maintain an organizational culture of honesty,
integrity, and high ethical standards.
SAS No. 99 supersedes SAS No. 82, Consideration of Fraud in a Financial Statement Audit and
AU sec. 316. It amends SAS No. 1, Codification of Auditing Standards and Procedures, vol. 1,
193
Chapter 7: Review of Statement on Auditing Standards No. 99
The first item in the above list, description and characteristics of fraud, was discussed earlier in
the course. Each of the remaining items are now discussed.
SAS No. 99 does not require any specific means of communication, only that the medium used
should permit an interactive exchange of ideas. It does state that an oral discussion is preferred
(as opposed to a memorandum or email discussion), probably because it best promotes and
facilitates the desired free interchange of ideas among team members.
Guidance is also provided as to the extent of the discussion, how it should occur, and who should
be included. Clearly, professional judgment should be used in making these determinations and
the following items should be considered:
• The number of locations -- Because each location can be different, key audit-team
194
Chapter 7: Review of Statement on Auditing Standards No. 99
SAS No. 99 also provides guidance as to what items the audit team should discuss.
• Experienced audit-team members, especially the auditor with final responsibility for the
audit, should share his or her insights and knowledge about the organization being
audited and the industry in which it operates.
• Audit-team members should discuss the possibility and likelihood of management
overriding the organization’s internal controls. Audit-team members should approach the
discussion with a questioning mind and set aside any prior beliefs regarding management
honesty and integrity.
• Another issue that should be discussed is how the organization’s financial statements
might be susceptible to material-misstatement fraud and where fraud is most likely to
occur. This discussion should include all known external and internal factors affecting the
organization that might create pressures (incentives, motives, etc.) for management or
other employees to commit fraud, allow an opportunity to commit and conceal a fraud,
and indicate a corporate culture or environment that enables management to rationalize
fraud.
• It is important to maintain the proper state of mind (an attitude of professional
skepticism) throughout the entire audit engagement.
o Auditors must have a questioning mind that recognizes that there may be material
misstatements in the financial statements due to fraud.
o They must also constantly be on the alert for any information that indicates a
potential material misstatement.
o Auditors should set aside any belief they have about management’s honesty and
integrity. They should not be satisfied with evidence that is not persuasive just
because they believe management is honest.
o It is important to critically assess audit evidence regarding the potential for
material misstatement due to fraud.
195
Chapter 7: Review of Statement on Auditing Standards No. 99
Make Inquiries of Management and Others within the Entity About Fraud
SAS No. 99 states “The auditor’s inquiries of management and others within the entity are
important because fraud often is uncovered through information received in response to
inquiries. One reason for this is that such inquiries may provide individuals with an opportunity
to convey information to the auditor that otherwise might not be communicated.”
However, in some cases responses to inquiries will be inconsistent. In other instances, the
information an auditor is given while making inquiries will need to be substantiated. The auditor
must exercise professional judgment in deciding what additional evidence must be gathered to
resolve these concerns.
Auditors should address their inquiries with several groups within an organization.
• Management -- SAS No. 99 states that management should be interviewed to determine
their views with respect to the organization’s fraud risks, and how those risks are
addressed. The expanded inquiries of management should cover the following:
o Whether management knows of any fraud that has taken place or is currently
being perpetrated.
o Whether management knows of any past or current allegations of fraudulent
financial reporting. These fraud allegation tips often come from current or former
employees, analysts, short sellers, or other investors.
o The fraud risks the organization faces and management’s understanding of those
risks. Of particular importance are specific fraud risks the organization has
identified, or account balances or classes of transactions where the risk of fraud is
more likely to exist.
o The controls and programs management has put in place to reduce, deter, prevent,
or detect fraud risks, and the procedures management uses to monitor them.
o How, and to what extent, management monitors multiple locations and business
segments.
o Whether any of the operating locations or business segments has a higher risk
than normal.
o When and how management communicates its views on business practices and
ethical behavior to its employees.
o The nature and extent of management reports to the audit committee (or the board
of directors, the board of trustees, or the company’s owner) with respect to the
following:
¾ All five interrelated components of internal control: the control
environment, control activities, risk-assessment processes,
information and communication systems, and monitoring
196
Chapter 7: Review of Statement on Auditing Standards No. 99
activities; and
¾ How well management believes their internal controls prevent,
deter, and detect material fraud.
• Audit committee -- Managers are not the only ones who should take an active oversight
role with respect to the organization’s fraud-risk assessment and the controls and
programs established to deter, prevent, or detect fraud risks. SAS No. 99 states that
inquiries of the audit committee should cover the following:
o How the audit committee oversees the organization’s fraud-risk assessment;
o The controls, programs, and procedures the organization uses to eliminate or
reduce fraud risks;
o How the audit committee views the risks of fraud; and
o Whether any of the audit-committee members know of any suspected or actual
fraud.
• Others in the organization -- Management, the audit committee, and internal audit are
not necessarily the only ones that should be asked about fraud, as others in the
organization can often provide auditors with valuable perspectives. The information they
provide can support management responses, help uncover management override of
controls, and indicate how effectively management communicates standards of ethical
behavior.
The auditors must use his or her professional judgment to decide who else in the organization
should be asked about fraud and the extent of those inquiries. The key consideration in making
this decision is whether a person can provide information that will help the auditor identify fraud
risks. Auditors are most likely to make inquiries of the following:
• Anyone the auditor interacts with during the normal course of the audit, such as while
obtaining an understanding of the organization’s internal-control system, observing
inventory, performing cutoff tests, or investigating fluctuations uncovered during
analytical procedures;
197
Chapter 7: Review of Statement on Auditing Standards No. 99
Consider the Results of the Analytical Procedures Performed While Planning the Audit
Auditors perform analytical procedures as they plan audits in order identify items that need to be
investigated, such as transactions, events, amounts, ratios, or trends that, based on the auditor’s
understanding of the entity and its environment, do not agree with what the auditor expects to
find. These analytical procedures, typically performed on high-level, aggregated data, can be a
valuable tool in identifying where auditors should look to assess fraud risks. All unusual items
should be investigated to determine if they are indicative of fraud.
The most frequent type of financial-statement fraud involves improper revenue recognition.
Accordingly, SAS No. 99 indicates that it is especially important to perform revenue-related
analytical procedures. For example, monthly revenue for the current reporting period could be
compared to revenue recorded in a comparable prior period.
Most of the risk factors contained in SAS No. 82 are included in SAS No. 99 and a few
additional risk factors have been added. However, the fraud risk factors have been reorganized to
help facilitate risk assessment by the auditor. The fraud risk factors are presented based on the
two types of fraud: fraudulent financial reporting and misappropriation of assets. Within each of
these two fraud types, the risk factors are based on the fraud triangle, the three conditions
generally present when material misstatements due to fraud occur: (i) pressure, sometimes
referred to as incentive or motive; (ii) an opportunity to commit and conceal the fraud; and (iii)
rationalization (sometimes referred to as attitude).
These fraud risk factors are presented in SAS No. 99, Appendix A, which is titled “Examples of
Fraud Risk Factors.” Because fraud risk factors were covered extensively in prior chapters, they
are not covered again here.
198
Chapter 7: Review of Statement on Auditing Standards No. 99
information;
• While obtaining and reviewing the information gathered during the acceptance and
continuance of clients and engagements;
• While conducting reviews of interim financial statements; and
• While considering audit risk, especially with respect to identified inherent risks, at the
individual account balance or class of transaction level.
The previous section described the ways auditors could obtain the information they need to
identify the risk of material misstatement due to fraud. The auditor must use the information he
or she obtains as well as his or her professional judgment to identify fraud risks. In doing so, the
auditor needs to consider the following nine factors:
• The type of risk (fraudulent financial reporting or misappropriation of assets) that exists.
• The significance of the risk. (Is it large enough to be material?)
• The likelihood of the risk (the probability that the factor will actually result in a material
misstatement).
• The pervasiveness of the risk (whether it is pervasive to the financial statements as a
whole or related to a particular assertion, account, or class of transactions).
• The fraud triangle. Although fraud risks are more likely to exist when all three conditions
are observed, the auditor does not need to find all three conditions to identify a fraud risk.
Some of the conditions are hard to spot without the benefit of hindsight. For example, it
is hard to observe the rationalization process.
• The client’s size, complexity, and ownership attributes.
• The number of operating locations or business segments, as this often requires a separate
risk identification for each location or segment.
• Assertions, accounts, and classes of transactions that have high inherent risk. Because
these items are subject to significant judgment and subjectivity, managers are better able
and more likely to manipulate them. SAS No. 99 provides the following two examples:
“Liabilities resulting from a restructuring may be deemed to have high inherent risk
because of the high degree of subjectivity and management judgment involved in their
estimation. Similarly, revenues for software developers may be deemed to have high
199
Chapter 7: Review of Statement on Auditing Standards No. 99
inherent risk because of the subjectivity involved in recognizing and measuring software
revenue transactions.”
• Management override of controls. The auditor needs to address the risk of management
override of controls regardless of whether the auditor is able to identify specific fraud
risks. In many cases, management has overridden controls to perpetrate fraud using such
techniques as recording fictitious journal entries (particularly those recorded close to the
end of an accounting period to manipulate operating results), intentionally biasing
assumptions and judgments used to estimate account balances, and altering records and
terms related to significant and unusual transactions.
• Because revenue recognition is so susceptible to manipulation, the auditor will usually
determine that there is a risk of material misstatement due to management override of
internal controls. For example, revenues can be overstated (premature revenue
recognition or recording fictitious revenues) or understated (misapplication of cash
receipts).
Organizations can implement controls to reduce or eliminate fraud on two levels: (i) specific
controls can be designed to reduce or eliminate specific fraud risks (for example, controls to
protect easily stolen assets such as cash or inventory); and (ii) general programs can be designed
to prevent, deter, and detect fraud. An example is fraud awareness training for all employees on
policies, procedures, and programs to promote a culture of honesty and ethical behavior.
Once an understanding has been obtained of the client’s general and specific controls, the auditor
must determine if they have been properly designed to prevent or detect the identified risks of
material misstatement due to fraud or whether specific control deficiencies may exacerbate the
risks. If the programs and controls are properly designed, auditors must verify that they are in
place and operational. Then the auditor should use the controls evaluation to assess fraud risks
and determine a response to those risks. These responses are discussed in the next section.
200
Chapter 7: Review of Statement on Auditing Standards No. 99
and controls to address those risks, influence the auditor's response to the fraud-risk assessment.
The auditor can respond to the fraud-risk assessment in four ways:
1. An overall response to identified risks (that is, general considerations, apart from planned
specific procedures, that have an overall effect on how the audit is conducted).
2. A response to identified risks that involves the nature, timing, and extent of procedures to
be performed.
3. A response to the risk that management could override controls. (Because management
can often override traditional controls, substantive tests should be conducted to evaluate
the risk of management overrides.)
4. If the auditor decides it is impracticable to design auditing procedures to sufficiently
address identified fraud risks, he or she should withdraw from the engagement and
communicate with the appropriate parties.
201
Chapter 7: Review of Statement on Auditing Standards No. 99
Responses to Identified Risks Involving the Nature, Timing, and Extent of Procedures to
Be Performed
The nature, timing, and extent of audit procedures performed (both substantive tests and tests of
controls) is impacted by the types or combinations of risks the auditor identifies. It is also
impacted by account balances and transaction classes and their related assertions. In most cases,
substantive tests are affected because audit risk cannot be reduced sufficiently through tests of
controls, as management may be able to override controls that seem to be operating effectively.
Auditing procedures can be changed in the ways described below to address specifically
identified fraud risks.
• The nature of auditing procedures. When fraud risks are identified, auditors should
consider obtaining more reliable evidence or additional corroborative evidence. The
nature of auditing procedures performed may be changed in one or more of the following
ways:
o Obtain more evidential matter from independent or third-party sources. For
example, the auditor might seek public-record information to verify the existence
and the nature of key customers, vendors, or counter parties in a major
transaction.
o Physically observe or inspect more assets than are normally observed and/or
observe assets not normally observed.
o Make use of more or not previously used computer-assisted audit techniques. This
facilitates the auditor gathering more extensive evidence about significant
accounts and data stored in electronic data files.
o Increase the number of people, especially those in management, that are
interviewed about fraud risks to identify issues and obtain corroborating evidence.
o Interview people in the areas where fraud risk is identified, seeking their insights
into both the identified risk and how controls address the risk.
o When independent CPA firms audit the statements of subsidiaries, divisions, or
202
Chapter 7: Review of Statement on Auditing Standards No. 99
branches, discuss with them how much evidence needs to be gathered to address
fraud risk.
• Vary the timing of substantive tests.
o Decide not to perform interim substantive tests because the risks of intentional
misstatement or manipulation make them ineffective.
o Perform substantive tests of transactions throughout the period being audited
because intentional misstatements, such as inappropriate revenue recognition,
may have taken place during the interim period.
o Perform procedures at locations on a surprise or unannounced basis. For example,
the auditor could observe inventory either on unexpected dates or at unexpected
locations, or both. The auditor could also count cash on a surprise basis.
• Change the extent to which procedures are applied. When fraud risks are identified,
more evidence may need to be gathered. This can be done in the following ways:
o Increase sample sizes.
o Perform substantive analytical procedures using disaggregated data. For example,
gross-profit or operating margins by location, by line of business, or by month
could be compared to auditor-developed expectations.
o Test electronic transactions and account files more extensively. Use computer-
assisted audit techniques to test entire populations or select transactions with
specific characteristics.
o Supplement written confirmations with oral inquiries of major customers and
suppliers. Alternatively, confirmations could be sent to a specific person at the
customer or supplier.
203
Chapter 7: Review of Statement on Auditing Standards No. 99
relationships or transactions.
o Confirm contract terms and the absence of side agreements with customers. Some
of the most important revenue-recognition-related items to confirm are:
¾ Acceptance criteria;
¾ Delivery and payment terms;
¾ The absence of future or continuing vendor obligations;
¾ The right to return the product;
¾ Guaranteed resale amounts; and
¾ Cancellation or refund provisions.
o Inquire about end-of-period sales or shipments and any unusual terms or
conditions associated with them. The best people to ask are sales and marketing
personnel and in-house legal counsel.
o Another effective procedure involves being physically present at one or more
locations at period end, in order to:
¾ Observe goods being shipped;
¾ Observe goods being readied for shipment;
¾ Observe returns awaiting processing; and
¾ Perform sales and inventory cutoff procedures the auditor deems
appropriate.
o Test whether controls provide assurance that recorded revenue transactions
occurred and are properly recorded. This is especially important for revenue
transactions that are electronically initiated, processed, and recorded.
• Inventory quantities -- When identified fraud risks are related to inventory quantities,
the auditor should consider the following audit procedures:
o Examine inventory records to identify locations or items that, during or after the
physical inventory count, require specific attention.
o Observe inventory counts at certain locations on an unannounced basis.
o Observe inventory counts at all locations on the same date.
o Count inventory at the end of the reporting period, or on a date closer to period-
end. This will help minimize the risk that account balances are manipulated
between the date the count is completed and the date the reporting period ends.
o Use a specialist.
o Perform additional procedures during the observation of the count, such as:
¾ Examining the contents of boxed items more carefully;
¾ Examining the way goods are stacked (check for hollow squares, etc.) or
labeled;
¾ Verifying the purity, grade, and concentration of liquid substances; and
204
Chapter 7: Review of Statement on Auditing Standards No. 99
¾ Testing more count sheets, tags, or other records to minimize the risk that
they will be altered later or compiled improperly.
o Test the reasonableness of physical counts in other ways, such as:
¾ Comparing current-period quantities with those of prior periods. This is
best done by inventory class or category, location, or some other criteria.
¾ Agreeing count quantities to perpetual records.
¾ Sorting tags numerically to test tag controls or by item serial number to
determine if tags have been duplicated or omitted.
• Management estimates -- Many financial-reporting frauds are perpetrated by
intentionally misstating one or more of the estimates that are a part of financial
statements. Estimates are based on both objective and subjective factors, and the
subjective factors are susceptible to bias even when competent personnel use relevant and
accurate data to make their estimates. Some of the more important estimates involve: (i)
asset valuation; (ii) specific transactions, such as acquisitions, restructurings, and
disposing of a business segment; and (iii) significant accrued liabilities, such as pension
and other post-retirement benefit obligations and environmental remediation liabilities.
• Management has final responsibility for making most of the assumptions or judgments
that are used to make these estimates. They are also responsible, on an ongoing basis, for
monitoring the reasonableness of the accounting estimates.
• In addressing fraud risk involving management estimates, the auditor should consider
supplementing management’s estimates with additional audit evidence, using it to
develop an independent estimate, comparing it to management’s estimate, and
determining if any differences indicate a possible bias on the part of management. If so,
the auditor should reconsider the estimates taken as a whole.
• Another way to test for possible management biases is to review management judgments
and assumptions from prior periods. If they were not accurate or realistic, it may indicate
that current-year estimates may be biased. The best choices for retrospective reviews are
estimates significantly affected by management judgments or based on highly sensitive
assumptions. It is important to realize that these reviews are not intended to call into
question the auditor’s prior-year professional judgments that were based on the
information available at the time. When auditors identify a possible prior-year bias in an
accounting estimate they should determine if it represents a fraud risk. If so, the auditor
should reconsider the estimates, taken as a whole.
205
Chapter 7: Review of Statement on Auditing Standards No. 99
Management is often able to override controls that, when not overridden, operate effectively and
mitigate fraud risks. Also segment or division managers are often in a position to fudge their
accounting records in a way that materially misstates the organization’s consolidated financial
statements.
Unless the auditor concludes that they should not be performed, the procedures to address the
risk of management override of controls described below are appropriate for most audits. The
procedures should always be performed for financial-statement audits of public entities because
investors place pressures on management to achieve a given level of financial performance and
management can be tempted to fudge numbers to achieve financial-performance objectives.
These procedures should also be performed for nonpublic-entity financial statements audits.
They also face pressures from the board of directors, contributors, investors, creditors, or
vendors, or there is pressure to meet financial or other performance targets. Although infrequent,
SAS No. 99 provides three examples of when the auditor may decide that some or all of these
procedures are not necessary.
• The client is a nonpublic entity or a not-for-profit organization for which the auditor
concludes there is little incentive or pressure to achieve specified levels of financial
performance to satisfy either external or internal users of the financial statements or to
inappropriately minimize income-tax liabilities;
• An employee benefit plan performed to satisfy regulatory requirements and the auditor
concludes there is little incentive or pressure to inappropriately report the financial
condition or performance of the plan; or
• A subsidiary performed solely to satisfy statutory requirements that are unrelated to
financial condition or performance.
Should the auditor conclude that the procedures to test for management override of controls are
not necessary, he or she should document that conclusion. Documentation requirements are
discussed more fully later in this chapter.
206
Chapter 7: Review of Statement on Auditing Standards No. 99
SAS No. 99 recommends the following audit procedures to address the risk that management
overrides controls: (i) an examination of journal entries and other adjustments, especially at or
near period-end; (ii) a review of accounting estimates for bias, particularly a retrospective review
of significant management estimates; and (iii) an evaluation of significant, unusual transactions,
especially at or near period-end.
Auditors are required to understand the client’s system of internal controls. They should also
obtain an understanding of whether the controls are suitably designed and have been placed in
operation. Auditors are also required to understand the automated and manual procedures their
clients use to prepare financial statements and related disclosures, including procedures used to:
(i) enter transaction totals into the general ledger; (ii) initiate, record, and process journal entries
in the general ledger; and (iii) record recurring and nonrecurring adjustments to the financial
statements.
Auditors should use this understanding to identify the client’s normal journal entries and
adjustments (nature or type, number, size, source, etc.) and the procedures and controls used
(who is authorized to make them, required approvals, how they are recorded, etc). This
knowledge will help the auditor spot inappropriate or unauthorized journal entries and
adjustments, which often have one or more of the following unique identifying characteristics:
• The entry or adjustment was made to unrelated, unusual, or seldom-used accounts or
business segments;
• It was recorded at the end of the reporting period, as post-closing entries, or before or
during the preparation of the financial statements;
• It often has little or no explanation or description;
• It often has no account number; and
• It contains round numbers or a consistent ending number.
In testing journal entries and adjustments, the auditor should use his or her professional judgment
to determine the nature, timing, and extent of the tests. In making those decisions, the auditor
should consider the following:
• Identified fraud risk factors can help the auditor select which journal entries to test and
determine the extent of testing necessary.
• If the auditor tests the controls over the preparation and posting of journal entries and
finds them effective, it may be possible to reduce the extent of substantive testing of
207
Chapter 7: Review of Statement on Auditing Standards No. 99
journal entries.
• Audit procedures will be different in a manual, paper-based system than in an automated
financial-reporting system. In paper-based system, the auditor will inspect the general
ledger to identify which journal entries to test and to examine support for the selected
items. In a computer-based system, as journal entries and adjustments often only exist in
electronic form, the auditor will normally use computer-assisted audit tools to identify the
items to test.
• Accounts or transactions that are complex or unusual in nature, contain significant
estimates, or are associated with an identified fraud risk deserve added attention, as they
are prone to fraud.
• When clients have several locations or components, the auditor should consider using the
factors set forth in SAS No. 47 to select journal entries from the various locations.
• The auditor should consider testing journal entries and adjustments throughout the
reporting period, as they can take place any time during the reporting period. However,
special attention should be paid to end-of-period journal entries and adjustments, as that
is when fraudulent entries are most likely to occur.
208
Chapter 7: Review of Statement on Auditing Standards No. 99
209
Chapter 7: Review of Statement on Auditing Standards No. 99
substantive tests indicate any previously unrecognized fraud risks. SAS No. 99 gives a special
emphasis to revenue-related analytical procedures, stating that they should be performed through
the end of the reporting period. Any previously unrecognized fraud risks should be investigated.
In analyzing the results of the analytical procedures, the auditor must exercise his or her
professional judgment to determine which particular trends and relationships might indicate
fraud risk. It is particularly important to carefully review year-end revenue and income. Two
examples of unusual relationships that might indicate fraud are uncharacteristically large
amounts of income from unusual transactions during the last few weeks of the reporting period
and income that is not consistent with prior trends in cash flow from operations.
When a fraud is perpetrated, normal relationships and trends are often thrown out of balance and
can be spotted by the auditor. A clever perpetrator will cover his or her tracks by manipulating
other data to make these relationships and trends appear normal. However, there are certain
types of information that management and employees have a hard time manipulating in order to
create seemingly normal or expected relationships. These unusual or unexpected analytical
relationships are especially useful to auditors as they seek to uncover fraud risks and evidence of
fraud. Some of the more useful relationships are presented in SAS No. 99:
• The relationship of net income to cash flows from operations may appear unusual
because management recorded fictitious revenues and receivables but was unable to
manipulate cash.
• A change in inventory, accounts payable, sales, or cost of sales from the prior period to
the current period may be inconsistent, indicating a possible employee theft of inventory,
because the employee was unable to manipulate all of these accounts.
• A comparison of the entity’s profitability to industry trends, which management cannot
manipulate, may indicate trends or differences for further consideration when identifying
risks of material misstatement due to fraud.
• A comparison of bad-debt write-offs to comparable industry data, which employees
cannot manipulate, may provide unexplained relationships that could indicate a possible
theft of cash receipts.
• An unexpected or unexplained relationship between sales volume as determined from the
accounting records and production statistics maintained by operations personnel -- which
may be more difficult for management to manipulate -- may indicate a possible
misstatement of sales.
When the auditor spots unusual relationships, one way to investigate them is to ask the client to
explain what might have caused them. In such cases, it is especially important to note the client’s
reactions to the questions. Responses that are vague, implausible, or are contrary with other
evidential matter gathered during the audit should be investigated very carefully, as the client
may be trying to cover up fraudulent activity. However, there is another good explanation for
the client’s behavior and that is that he or she might not know what caused the unusual
relationship and might be reluctant to admit it.
210
Chapter 7: Review of Statement on Auditing Standards No. 99
211
Chapter 7: Review of Statement on Auditing Standards No. 99
Before Withdrawing, the Auditor Should Consider Consulting with Legal Counsel.
Normally the auditor should take evidence about fraud to management at least one level above
where the fraud is suspected or took place. The auditor should communicate this information
even if the fraud is immaterial or inconsequential, such as an embezzlement by a lower-level
employee. To avoid disagreements or problems regarding lower-level employee
misappropriations, the auditor and the audit committee should reach an understanding, prior to
the engagement, about the expected nature and extent of communications if such fraud takes
place.
When fraud involves senior management and when it causes a material misstatement of the
financial statements it should be reported directly to the audit committee, who can take the
matter to the entire board of directors. If an audit committee does not exist, the fraud should be
reported to the senior executive in the firm. If there is a possibility that this senior executive is
involved in the fraud, the auditor should consider withdrawing from the engagement.
Sometimes the auditor will have to determine if the following items represent reportable
conditions that should be communicated to the audit committee and senior management: (i) risk
factors with continuing control implications (whether or not transactions or adjustments that
could be the result of fraud have been detected); and (ii) the absence of, or the poor quality of,
deficiencies in programs and controls to minimize or prevent specific fraud risks (or to otherwise
212
Chapter 7: Review of Statement on Auditing Standards No. 99
Conditions other than reportable conditions may also be reported if it is possible for management
to take actions to address them.
The fraud risks the auditor identifies during his or her risk assessment can, and probably should,
be communicated to the client. This can be communicated: (i) separately to the audit committee;
(ii) as part of an overall communication of business and financial-statement risks affecting the
organization; or (iii) as part of the auditor’s report on the quality of the entity’s accounting
principles
Ordinarily the auditor is not required to disclose possible fraud to anyone other than the client's
senior management and its audit committee. In fact, the auditor's ethical or legal obligations of
confidentiality do not allow him to disclose this information unless the matter is reflected in the
auditor's report. However, SAS No. 99 specifies that auditors do have a responsibility, in the
following circumstances, to disclose information to outsiders:
• To comply with certain legal and regulatory requirements, such as engagement
termination reports (reporting auditor changes on Form 8-K or when the fraud risk factors
constitute a reportable event or are the source of a disagreement) or reports relating to an
illegal act that has a material effect on the financial statements;
• To a successor auditor when they make an inquiry to comply with SAS No. 84,
Communications Between Predecessor and Successor Auditors;
• In response to a subpoena; and
• To a funding or other specified agency in accordance with requirements for the audits of
entities that receive financial assistance from the government.
Before discussing any of the items in this section with parties other than the client, the auditor
may wish to consult with legal counsel to avoid potential conflicts with the auditor's ethical and
legal obligations for confidentiality.
213
Chapter 7: Review of Statement on Auditing Standards No. 99
• The procedures they performed to gather the information they needed to identify and
assess fraud risks;
• The fraud risk factors that were identified during planning and field work and the
auditor’s response to those risks;
• When the auditor concludes that additional procedures to address the risk of management
override of controls is not necessary, the support for that conclusion must be documented;
and
• The communications to management, the audit committee, and others regarding fraud.
The auditor is allowed significant flexibility with respect to the form of documentation used to
meet documentation requirements. It might take the form of: (i) a comprehensive checklist that
lists risk factors by category; or (ii) a memo to document the risk factors identified and the
planned response.
Two other items of documentation that are important are the engagement letter and the
management letter. SAS No. 99 does not mention the engagement letter, but it is important for
the auditor to make sure that the responsibilities of both management and the auditors are spelled
out in the engagement letter. Doing so may help reduce the auditor’s legal liability.
Some audit firms currently send engagement letters with a sentence that goes something like.
“An audit is not designed and cannot be relied upon to detect irregularities such as defalcations
and embezzlements.” Unfortunately, this sentence has not accurately described the auditor’s
responsibility to detect fraud for some time. Now that SAS No. 99 has become effective, the
engagement letter should describe the auditor’s responsibility for fraud detection in terms that
are consistent with the new pronouncement. For example, the auditor could use terminology
214
Chapter 7: Review of Statement on Auditing Standards No. 99
“The purpose of our audit is to express an opinion on the company’s financial statements
that provides reasonable assurance that those statements are free of material
misstatement, whether caused by error or fraud. However, an audit cannot provide
absolute assurance that all material misstatements are detected. Also, an audit is not
designed to detect error or fraud that is immaterial to the financial statements and cannot
be relied upon to do so.”
SAS No. 83, Establishing an Understanding with the Client, contains an example representation
letter. The letter suggests the following management representations, which can be used to
partially document the requirement in SAS No. 99 that the auditor inquire about management’s
knowledge of frauds:
• There has not been any fraud involving management or employees who have significant
roles in internal control; and
• There has not been any fraud involving others that could have a material effect on the
financial statements.
Prior to SAS No. 82, none of the communications with the client required the auditor to use the
word “fraud.” Fraud, in the eyes of many, is an emotionally laden word. Therefore, it is a good
idea for the auditor to verbally explain to top management that SAS No. 99 requires the use of
the word “fraud” in all GAAP audits (not just their audit), rather than the word “irregularities,”
which was previously used. This should help ensure that there is no misunderstanding or ill will
created when they receive the engagement letter or when the suggested statements regarding
fraud are requested in the management representation letter. It is certainly better to spend a little
time up-front to maintain good client relations than it is to try and mend fences when a problem
occurs.
It is the policy of some CPA firms to require their personnel to write a memo at the end of the
audit to document all client inquires and management responses concerning irregularities and
illegal acts. With the issuance of SAS No. 99, this policy should be updated to include the fraud-
related inquiries. If the CPA firm does not have such a policy, it is highly advisable that they
adopt one to comply with the new fraud-related documentation requirement. While SAS No. 99
does not actually require documentation regarding the client inquiries (as it does for the risk
factors that are identified), peer reviewers will probably expect documentation that the inquiries
were made and that consideration was given to management’s responses.
215
Chapter 7 Review Questions
The review questions accompanying each chapter are designed to assist you in achieving the
learning objectives stated at the beginning of each chapter. The review section is not graded; do
not submit it in place of your final exam. While completing the review questions, it may be
helpful to study any unfamiliar terms in the glossary in addition to chapter course content. After
completing the review questions for each chapter, proceed to the review question answers and
rationales.
1. Which of the following Statements on Auditing Standards states that determining the
nature, timing, and extent of the audit procedures is directly related to the auditor’s
consideration of audit risk?
A. SAS 1.
B. SAS 47.
C. SAS 82.
D. SAS 99.
3. According to SAS 99, while making inquiries of management and others within the entity
about fraud, which of the following groups should the auditor ask about how they oversee
the organization’s fraud-risk assessment?
A. Management.
B. Audit committee.
C. Internal audit personnel.
D. Others in the organization.
A. True.
B. False.
5. In responding to the results of the fraud risk assessment, obtaining more evidential matter
from independent or third-party sources is considered:
216
Chapter 7 Review Questions
6. According to the SAS 99 list of examples for conditions identified during fieldwork that
either change or support their judgment regarding the assessment of fraud risk, balances
or transactions that are unsupported or unauthorized are considered:
7. According to the SAS 99 list of examples for conditions identified during fieldwork that
either change or support their judgment regarding the assessment of fraud risk, items on
reconciliations that are significant and unexplained are considered:
217
Chapter 7 Review Question Answers and Rationales
Review question answer choices are accompanied by unique, logical reasoning (rationales) as to
why an answer is correct or incorrect. Evaluative feedback to incorrect responses and
reinforcement feedback to correct responses are both provided.
1. Which of the following Statements on Auditing Standards states that determining the
nature, timing, and extent of the audit procedures is directly related to the auditor’s
consideration of audit risk?
218
Chapter 7 Review Question Answers and Rationales
3. According to SAS 99, while making inquiries of management and others within the entity
about fraud, which of the following groups should the auditor ask about how they oversee
the organization’s fraud-risk assessment?
5. In responding to the results of the fraud risk assessment, obtaining more evidential matter
from independent or third-party sources is considered:
219
Chapter 7 Review Question Answers and Rationales
6. According to the SAS 99 list of examples for conditions identified during fieldwork that
either change or support their judgment regarding the assessment of fraud risk, balances
or transactions that are unsupported or unauthorized are considered:
7. According to the SAS 99 list of examples for conditions identified during fieldwork that
either change or support their judgment regarding the assessment of fraud risk, items on
reconciliations that are significant and unexplained are considered:
220
Chapter 7 Review Question Answers and Rationales
A. Determine how this impacts other aspects of the audit. This answer is
correct because SAS 99 does require an auditor to respond to material
misstatements that may be the result of fraud by determining how it impacts
other aspects of the audit.
B. Contact local law enforcement. This answer is incorrect because SAS 99 does not
require an auditor to respond to material misstatements that may be the result of
fraud by contacting local law enforcement.
C. Withdraw from the engagement. This answer is incorrect because SAS 99 does
not require an auditor to respond to material misstatements that may be the result
of fraud by withdrawing from the engagement.
D. Evaluate the implications, especially those dealing with the organizational
position of the person(s) involved. This answer is incorrect because SAS 99 does
not require an auditor to respond to material misstatements that may be the result
of fraud by evaluating the implications dealing with the organizational position of
the person(s) involved.
221
Glossary
Glossary
This is a glossary of key terms with definitions. Please review any terms you are not familiar
with.
Accounting symptoms: A type of fraud symptom that exists when some element of the
documents, journal entries, or ledgers was altered, forged, manipulated, or destroyed to hide the
fraud when a fraud is committed.
Analytical symptoms: A type of fraud symptom that exists when analytical procedures produce
results that deviate significantly from the auditor’s expectations.
Asset method: One of the two types of net worth calculations used to reveal discrepancies
between reported income and expenditures. The asset method uncovers inconsistencies in
revenue and expenses when the perpetrator uses illicit income to purchase assets.
Computer security officers: A type of specialist who is responsible for fraud deterrence and
detection and has a significant deterrent effect on computer frauds. The security officer can
monitor the system and disseminate information about improper system uses and their
consequences.
Customer fraud: A type of external fraud in which an outsider is able to get something of value
without having to pay for it.
Document evidence: One of the most important types of evidence a fraud investigator gathers
is document evidence since it is the largest and the most frequently gathered type of evidence.
Documents provide a paper trail that shows an investigator what happened during each step as
the document was processed.
Environmental symptoms: A type of fraud symptom that exists when a company has
confusion about honesty and ethics, past occurrences of fraud, domineering or overbearing
management, or the company frequently operates in rush mode. Studies have found that the
222
Glossary
honesty of some employees is significantly affected by the cultural standards of management and
their co-workers.
Evidence collection: Step two of the four-step investigation strategy, the objective of this step is
to determine if, in fact, a fraud did occur.
Evidence evaluation: Step three of the four-step investigation strategy, the objective of this step
is to determine whether it is sufficient to effectively evaluate and report the fraud.
Expected fraud loss: The mathematical product of fraud risk and fraud exposure.
Expenditure method: One of the two types of net worth calculations used to reveal
discrepancies between reported income and expenditures. The expenditure method is used when
the illicit income is spent on expensive living, travel, and entertainment, rather than to buy assets
such as cars and boats.
External fraud: A type of fraud in which an outsider steals company assets by committing
either a customer fraud or a vendor fraud.
Fraud: An intentional act of deceit for the purpose of gaining an unfair advantage that results in
an injury to the rights or interests of another person.
Fraud detection: The procedures or actions undertaken to ascertain that a fraud has, in fact,
been committed.
Fraud exposure: The dollar amount that could be lost if a particular risk factor led to a fraud.
Fraud investigation: The purpose of a fraud investigation is to determine if, in fact, a fraud
occurred and, if it did, the extent of the fraud. To make this determination, there are a number of
different types of evidence that can be gathered and analyzed.
Fraud risk: The likelihood or probability that a fraud will actually take place.
Fraud symptoms: The signs or manifestations, such as missing assets; fraudulent documents;
and forged checks; that a fraud has taken place.
Fraudulent reporting of company results: One of the four areas of fraud vulnerability,
company results are manipulated to look better than they actually are by inflating assets or net
income.
223
Glossary
Internal control symptoms: A type of fraud symptom. Internal control symptoms exist when
there is one or more of the following; inadequate internal control, non-enforcement of internal
control, or inadequate monitoring of significant controls.
Invigilation: The process of observing and controlling company activities so closely for a
period of time that fraud is virtually impossible.
Kiting: A common scheme used to hide a theft in which the perpetrator creates cash by taking
advantage of the timing lag between depositing a check and the check clearing the bank.
Lapping: A common scheme used to hide a theft in which the perpetrator steals the cash or
check that Customer A mails in to pay its accounts receivable. Funds received at a later date
from Customer B are used to pay off customer A’s balance.
Lifestyle symptoms: A type of fraud symptom that exists when perpetrators show off their
trappings of success and do not hide their newfound wealth. Any evidence of company
employees living beyond their means should be thoroughly investigated.
Misappropriation of company assets: One of the four areas of fraud vulnerability, it includes
company cash, inventory, supplies, equipment, machinery, and fixed assets are susceptible to
fraud.
Opportunity: One of the three conditions of the fraud triangle, it refers to the condition or
situation that allows a person or organization to do three things; commit the fraud, conceal the
fraud, and convert the theft or misrepresentation to personal gain.
224
Glossary
People evidence: People in and out of a defrauded company are sources of evidence for fraud
investigators. Hotlines, informants, interviews, and interrogation can be used to gather the
information from the people with whom the perpetrator interacts.
Pressure: One of the three conditions of the fraud triangle, it refers to the non-sharable
problems individuals have that motivate them to act dishonestly.
Problem recognition and definition: Step one of the four-step investigation strategy, the
objective of this step is to determine if there is sufficient cause, or predication, to investigate the
fraud symptoms.
Purchasing, disbursement of cash, and shipment of goods: One of the four areas of fraud
vulnerability, company disbursements could be stolen or diverted to pay personal bills, fictitious
bills could be paid, kickbacks or bid-rigging could result in inflated billings, and payments could
be made for hours not worked or for employees who do not exist.
Rationalization: One of the three conditions of the fraud triangle, it allows perpetrators to
justify their illegal behavior.
Receipt of goods or cash: One of the four areas of fraud vulnerability, cash receipts could be
stolen or misapplied or goods intended for the company could be stolen or diverted to
unauthorized uses.
Report findings: Step four of the four-step investigation strategy, the objective of this step is to
write up the results in a fraud report, which is often the only evidence available to support the
fraud investigation.
Surveillance: The secret and continuous observation of persons, places, and things to obtain
information about the identity and activity of individuals suspected of fraud.
Vendor fraud: An outsider gets a company or individual to fraudulently pay for goods or
services.
Vertical analysis (balance sheet): A means of analyzing individual financial statement account
balances by assigning total assets and as well as total liabilities and equity a value of 100 percent
and then showing all other balance sheet items as a percentage of these two totals.
225
Glossary
226
Index
Index
Evidence Collection182, 186, 187, 223, 238,
A
239
Accounting Symptoms.................... 222, 237 Evidence Evaluation ...... 182, 186, 187, 223,
Adelphia.......... 172, 173, 174, 176, 177, 178 238, 239
Adverse Opinions...................................... 99 Expected Fraud Loss................... 39, 44, 223
Analytical Procedures ............................. 222 Expenditure Method................................ 223
Analytical Symptoms...................... 222, 236 External Fraud....... 5, 8, 17, 19, 20, 223, 230
Arthur Andersen.............................. 160, 169
Asset Method .......................................... 222 F
Association of Certified Fraud Examiners Financial Pressure ..................................... 42
(ACFE) ........................ 1, 5, 16, 18, 58, 96 Forensic Accountant ......................... 96, 223
audit committee...... 193, 194, 196, 197, 211, forensic accountants............................ 95, 96
212, 213 Forensic Accountants................................ 96
Fraud .... 1, 2, 4, 5, 6, 7, 8, 10, 16, 18, 21, 23,
B
24, 25, 26, 31, 32, 34, 35, 39, 43, 44, 45,
Behavior Symptoms........................ 222, 237 49, 53, 58, 59, 62, 71, 75, 94, 96, 121,
bust-out ....................................................... 9 130, 131, 133, 134, 137, 143, 149, 152,
C 163, 171, 176, 178, 193, 194, 195, 196,
198, 201, 205, 208, 209, 211, 213, 215,
collusion.............. 5, 7, 23, 34, 116, 193, 200 223, 229, 232, 237, 243, 245, 246
Collusion ..................................................... 6 Fraud Detection................................. 94, 223
Company Vulnerabilities .......................... 94 Fraud Exposure ............. 34, 39, 43, 223, 232
Computer Security Officers .................... 222 Fraud Investigation ......................... 131, 223
Computer-Security Officers ...................... 95 Fraud Perpetrator .............................. 2, 4, 21
concealment ................................................ 3 Fraud Risk............... 34, 39, 43, 44, 223, 232
conversion ................................................... 3 fraud symptoms..... 94, 96, 97, 106, 108, 117
Customer Fraud............................... 222, 230 Fraud Symptoms ....................... 94, 223, 237
D fraud triangle ...................................... 26, 31
Fraud Triangle........................................... 26
Discovery Sampling................................ 139 fraudulent financial reporting .. 5, 7, 95, 196,
Document Evidence ........................ 136, 222 198, 199, 207
Document Symptoms.............................. 222 Fraudulent Financial Reporting ..... 7, 8, 207,
E 223, 230
Fraudulent Reporting of Company Results
Employee Fraud .............. 17, 19, 20, 56, 230
..................................... 122, 125, 223, 236
engagement letter ............................ 214, 215
Enron...... 160, 161, 162, 163, 166, 169, 170, H
176, 178 Handwriting Analysis ............................. 138
Environmental Symptoms....................... 222 Horizontal Analysis ........................ 101, 224
evidence 3, 6, 16, 19, 24, 58, 59, 94, 98, 108,
119, 131, 134, 135, 136, 137, 138, 139, I
140, 145, 147, 150, 151, 152, 154, 156, internal control ........ 195, 196, 200, 207, 215
178, 183, 193, 195, 196, 198, 201, 202, Internal Control Symptoms..................... 224
203, 205, 209, 210, 212, 213, 224 internal controls .......................... 3, 5, 7, 118
Interrogation............................................ 150
227
Index
228
Index
Vertical Analysis (Balance Sheet) .......... 225 Whistle-Blower ................................. 24, 163
Vertical Analysis (Income Statement) .... 226 whistle-blowing....................................... 114
WorldCom............... 166, 167, 168, 169, 171
W
whistle-blower........................................... 24
229